Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nss@3.12.2.0-1?arch=el4
Typerpm
Namespaceredhat
Namenss
Version3.12.2.0-1
Qualifiers
arch el4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-73rh-nbyu-8qeg
vulnerability_id VCID-73rh-nbyu-8qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5510
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-16T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77132
published_at 2026-04-01T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-12T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77193
published_at 2026-04-13T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77138
published_at 2026-04-02T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77167
published_at 2026-04-04T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.77149
published_at 2026-04-07T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-08T12:55:00Z
8
value 0.01018
scoring_system epss
scoring_elements 0.77191
published_at 2026-04-09T12:55:00Z
9
value 0.01018
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5510
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=228856
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=228856
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
7
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
8
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
9
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
10
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
11
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
12
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
13
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47415
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47415
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662
16
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
17
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
18
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
22
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
24
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
25
reference_url http://www.securitytracker.com/id?1021425
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021425
26
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
27
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
28
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476283
reference_id 476283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476283
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
reference_id CVE-2008-5510
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5510
reference_id CVE-2008-5510
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5510
40
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-67
reference_id mfsa2008-67
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-67
42
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
43
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
44
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
45
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
46
reference_url https://usn.ubuntu.com/717-3/
reference_id USN-717-3
reference_type
scores
url https://usn.ubuntu.com/717-3/
fixed_packages
aliases CVE-2008-5510
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73rh-nbyu-8qeg
1
url VCID-cza7-cbdd-h7f5
vulnerability_id VCID-cza7-cbdd-h7f5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5505
reference_id
reference_type
scores
0
value 0.00833
scoring_system epss
scoring_elements 0.74623
published_at 2026-04-16T12:55:00Z
1
value 0.00833
scoring_system epss
scoring_elements 0.74538
published_at 2026-04-01T12:55:00Z
2
value 0.00833
scoring_system epss
scoring_elements 0.74595
published_at 2026-04-12T12:55:00Z
3
value 0.00833
scoring_system epss
scoring_elements 0.74586
published_at 2026-04-13T12:55:00Z
4
value 0.00833
scoring_system epss
scoring_elements 0.74543
published_at 2026-04-02T12:55:00Z
5
value 0.00833
scoring_system epss
scoring_elements 0.7457
published_at 2026-04-04T12:55:00Z
6
value 0.00833
scoring_system epss
scoring_elements 0.74544
published_at 2026-04-07T12:55:00Z
7
value 0.00833
scoring_system epss
scoring_elements 0.74576
published_at 2026-04-08T12:55:00Z
8
value 0.00833
scoring_system epss
scoring_elements 0.74591
published_at 2026-04-09T12:55:00Z
9
value 0.00833
scoring_system epss
scoring_elements 0.74615
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5505
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=295994
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=295994
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
5
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
6
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47411
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47411
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10443
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10443
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
11
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-63.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-63.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
13
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
14
reference_url http://www.securitytracker.com/id?1021428
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021428
15
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476274
reference_id 476274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476274
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505
reference_id CVE-2008-5505
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5505
reference_id CVE-2008-5505
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5505
24
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-63
reference_id mfsa2008-63
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-63
26
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
27
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
fixed_packages
aliases CVE-2008-5505
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cza7-cbdd-h7f5
2
url VCID-eh6u-wqar-ubb7
vulnerability_id VCID-eh6u-wqar-ubb7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66884
published_at 2026-04-13T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66813
published_at 2026-04-01T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66931
published_at 2026-04-11T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-16T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-02T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66877
published_at 2026-04-04T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.6685
published_at 2026-04-07T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66898
published_at 2026-04-08T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66911
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
5
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
6
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
7
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
8
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
9
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
10
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
11
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021427
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021427
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476278
reference_id 476278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476278
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
reference_id mfsa2008-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
62
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
63
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5506
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh6u-wqar-ubb7
3
url VCID-f5tf-hr4a-tqad
vulnerability_id VCID-f5tf-hr4a-tqad
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5512
reference_id
reference_type
scores
0
value 0.04686
scoring_system epss
scoring_elements 0.8936
published_at 2026-04-16T12:55:00Z
1
value 0.04686
scoring_system epss
scoring_elements 0.89302
published_at 2026-04-01T12:55:00Z
2
value 0.04686
scoring_system epss
scoring_elements 0.89349
published_at 2026-04-12T12:55:00Z
3
value 0.04686
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-13T12:55:00Z
4
value 0.04686
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-02T12:55:00Z
5
value 0.04686
scoring_system epss
scoring_elements 0.8932
published_at 2026-04-04T12:55:00Z
6
value 0.04686
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-07T12:55:00Z
7
value 0.04686
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-08T12:55:00Z
8
value 0.04686
scoring_system epss
scoring_elements 0.89344
published_at 2026-04-09T12:55:00Z
9
value 0.04686
scoring_system epss
scoring_elements 0.89352
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5512
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47416
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47416
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021418
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021418
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476287
reference_id 476287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476287
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
reference_id CVE-2008-5512
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5512
reference_id CVE-2008-5512
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5512
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
reference_id mfsa2008-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5512
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5tf-hr4a-tqad
4
url VCID-g351-11xn-quhs
vulnerability_id VCID-g351-11xn-quhs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5501
reference_id
reference_type
scores
0
value 0.04539
scoring_system epss
scoring_elements 0.89191
published_at 2026-04-16T12:55:00Z
1
value 0.04539
scoring_system epss
scoring_elements 0.89126
published_at 2026-04-01T12:55:00Z
2
value 0.04539
scoring_system epss
scoring_elements 0.89181
published_at 2026-04-12T12:55:00Z
3
value 0.04539
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-13T12:55:00Z
4
value 0.04539
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-02T12:55:00Z
5
value 0.04539
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-04T12:55:00Z
6
value 0.04539
scoring_system epss
scoring_elements 0.89151
published_at 2026-04-07T12:55:00Z
7
value 0.04539
scoring_system epss
scoring_elements 0.89169
published_at 2026-04-08T12:55:00Z
8
value 0.04539
scoring_system epss
scoring_elements 0.89174
published_at 2026-04-09T12:55:00Z
9
value 0.04539
scoring_system epss
scoring_elements 0.89184
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5501
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=395623
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=395623
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
8
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47407
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47407
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
13
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
17
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
18
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
19
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476267
reference_id 476267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476267
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501
reference_id CVE-2008-5501
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5501
reference_id CVE-2008-5501
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5501
27
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
29
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
30
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
31
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
32
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
fixed_packages
aliases CVE-2008-5501
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g351-11xn-quhs
5
url VCID-hmsz-pbfg-ube6
vulnerability_id VCID-hmsz-pbfg-ube6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5513
reference_id
reference_type
scores
0
value 0.01096
scoring_system epss
scoring_elements 0.78032
published_at 2026-04-16T12:55:00Z
1
value 0.01096
scoring_system epss
scoring_elements 0.77942
published_at 2026-04-01T12:55:00Z
2
value 0.01096
scoring_system epss
scoring_elements 0.77999
published_at 2026-04-12T12:55:00Z
3
value 0.01096
scoring_system epss
scoring_elements 0.77997
published_at 2026-04-13T12:55:00Z
4
value 0.01096
scoring_system epss
scoring_elements 0.77949
published_at 2026-04-02T12:55:00Z
5
value 0.01096
scoring_system epss
scoring_elements 0.77976
published_at 2026-04-04T12:55:00Z
6
value 0.01096
scoring_system epss
scoring_elements 0.77958
published_at 2026-04-07T12:55:00Z
7
value 0.01096
scoring_system epss
scoring_elements 0.77984
published_at 2026-04-08T12:55:00Z
8
value 0.01096
scoring_system epss
scoring_elements 0.77989
published_at 2026-04-09T12:55:00Z
9
value 0.01096
scoring_system epss
scoring_elements 0.78015
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5513
2
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
8
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
9
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
10
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47418
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47418
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
14
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
17
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-69.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-69.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
21
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
22
reference_url http://www.securitytracker.com/id?1021421
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021421
23
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
24
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476289
reference_id 476289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476289
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
reference_id CVE-2008-5513
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5513
reference_id CVE-2008-5513
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5513
36
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-69
reference_id mfsa2008-69
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-69
38
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
39
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
40
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
41
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
42
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
fixed_packages
aliases CVE-2008-5513
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmsz-pbfg-ube6
6
url VCID-p598-baeh-dkd7
vulnerability_id VCID-p598-baeh-dkd7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
reference_id
reference_type
scores
0
value 0.06165
scoring_system epss
scoring_elements 0.90854
published_at 2026-04-16T12:55:00Z
1
value 0.06165
scoring_system epss
scoring_elements 0.90781
published_at 2026-04-01T12:55:00Z
2
value 0.06165
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-12T12:55:00Z
3
value 0.06165
scoring_system epss
scoring_elements 0.90834
published_at 2026-04-13T12:55:00Z
4
value 0.06165
scoring_system epss
scoring_elements 0.90787
published_at 2026-04-02T12:55:00Z
5
value 0.06165
scoring_system epss
scoring_elements 0.90799
published_at 2026-04-04T12:55:00Z
6
value 0.06165
scoring_system epss
scoring_elements 0.9081
published_at 2026-04-07T12:55:00Z
7
value 0.06165
scoring_system epss
scoring_elements 0.90821
published_at 2026-04-08T12:55:00Z
8
value 0.06165
scoring_system epss
scoring_elements 0.90828
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476266
reference_id 476266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476266
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5500
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p598-baeh-dkd7
7
url VCID-q376-zeq4-m3ah
vulnerability_id VCID-q376-zeq4-m3ah
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44142
published_at 2026-04-16T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44059
published_at 2026-04-01T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44097
published_at 2026-04-12T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44081
published_at 2026-04-13T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44107
published_at 2026-04-02T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.4413
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44061
published_at 2026-04-07T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44112
published_at 2026-04-08T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44114
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
3
reference_url http://scary.beasts.org/security/CESA-2008-011.html
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2008-011.html
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/archive/1/499353/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/499353/100/0/threaded
38
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
39
reference_url http://www.securitytracker.com/id?1021423
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021423
40
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
41
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
42
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
43
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476280
reference_id 476280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476280
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
56
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
reference_id mfsa2008-65
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
58
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
59
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
60
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
61
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
62
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
63
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
64
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
65
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5507
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q376-zeq4-m3ah
8
url VCID-r79k-3rkt-6fa8
vulnerability_id VCID-r79k-3rkt-6fa8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
reference_id
reference_type
scores
0
value 0.01017
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-16T12:55:00Z
1
value 0.01017
scoring_system epss
scoring_elements 0.77116
published_at 2026-04-01T12:55:00Z
2
value 0.01017
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-12T12:55:00Z
3
value 0.01017
scoring_system epss
scoring_elements 0.77177
published_at 2026-04-13T12:55:00Z
4
value 0.01017
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-02T12:55:00Z
5
value 0.01017
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-04T12:55:00Z
6
value 0.01017
scoring_system epss
scoring_elements 0.77134
published_at 2026-04-07T12:55:00Z
7
value 0.01017
scoring_system epss
scoring_elements 0.77166
published_at 2026-04-08T12:55:00Z
8
value 0.01017
scoring_system epss
scoring_elements 0.77175
published_at 2026-04-09T12:55:00Z
9
value 0.01017
scoring_system epss
scoring_elements 0.77202
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021418
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021418
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476285
reference_id 476285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476285
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
reference_id mfsa2008-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5511
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r79k-3rkt-6fa8
9
url VCID-rjzx-gx6e-23ff
vulnerability_id VCID-rjzx-gx6e-23ff
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
reference_id
reference_type
scores
0
value 0.02182
scoring_system epss
scoring_elements 0.84378
published_at 2026-04-16T12:55:00Z
1
value 0.02182
scoring_system epss
scoring_elements 0.84288
published_at 2026-04-01T12:55:00Z
2
value 0.02182
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-12T12:55:00Z
3
value 0.02182
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-13T12:55:00Z
4
value 0.02182
scoring_system epss
scoring_elements 0.84301
published_at 2026-04-02T12:55:00Z
5
value 0.02182
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-04T12:55:00Z
6
value 0.02182
scoring_system epss
scoring_elements 0.84323
published_at 2026-04-07T12:55:00Z
7
value 0.02182
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-08T12:55:00Z
8
value 0.02182
scoring_system epss
scoring_elements 0.8435
published_at 2026-04-09T12:55:00Z
9
value 0.02182
scoring_system epss
scoring_elements 0.84368
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021426
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021426
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476281
reference_id 476281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476281
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
reference_id mfsa2008-66
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
62
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5508
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjzx-gx6e-23ff
10
url VCID-rswk-w1h3-zbc9
vulnerability_id VCID-rswk-w1h3-zbc9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5502
reference_id
reference_type
scores
0
value 0.03767
scoring_system epss
scoring_elements 0.88057
published_at 2026-04-16T12:55:00Z
1
value 0.03767
scoring_system epss
scoring_elements 0.87987
published_at 2026-04-01T12:55:00Z
2
value 0.03767
scoring_system epss
scoring_elements 0.88043
published_at 2026-04-12T12:55:00Z
3
value 0.03767
scoring_system epss
scoring_elements 0.88044
published_at 2026-04-13T12:55:00Z
4
value 0.03767
scoring_system epss
scoring_elements 0.87996
published_at 2026-04-02T12:55:00Z
5
value 0.03767
scoring_system epss
scoring_elements 0.8801
published_at 2026-04-04T12:55:00Z
6
value 0.03767
scoring_system epss
scoring_elements 0.88015
published_at 2026-04-07T12:55:00Z
7
value 0.03767
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-08T12:55:00Z
8
value 0.03767
scoring_system epss
scoring_elements 0.88041
published_at 2026-04-09T12:55:00Z
9
value 0.03767
scoring_system epss
scoring_elements 0.88051
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5502
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=458679
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=458679
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
8
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47408
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47408
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
13
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
17
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
18
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
19
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476269
reference_id 476269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476269
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502
reference_id CVE-2008-5502
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5502
reference_id CVE-2008-5502
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5502
27
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
29
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
30
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
31
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
32
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
fixed_packages
aliases CVE-2008-5502
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rswk-w1h3-zbc9
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nss@3.12.2.0-1%3Farch=el4