Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/xulrunner@1.9.0.4-1?arch=el5
Typerpm
Namespaceredhat
Namexulrunner
Version1.9.0.4-1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-545b-g9k4-s7ej
vulnerability_id VCID-545b-g9k4-s7ej
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5015.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5015
reference_id
reference_type
scores
0
value 0.05714
scoring_system epss
scoring_elements 0.90442
published_at 2026-04-18T12:55:00Z
1
value 0.05714
scoring_system epss
scoring_elements 0.90386
published_at 2026-04-01T12:55:00Z
2
value 0.05714
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-12T12:55:00Z
3
value 0.05714
scoring_system epss
scoring_elements 0.90427
published_at 2026-04-13T12:55:00Z
4
value 0.05714
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-02T12:55:00Z
5
value 0.05714
scoring_system epss
scoring_elements 0.90401
published_at 2026-04-04T12:55:00Z
6
value 0.05714
scoring_system epss
scoring_elements 0.90406
published_at 2026-04-07T12:55:00Z
7
value 0.05714
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-08T12:55:00Z
8
value 0.05714
scoring_system epss
scoring_elements 0.90426
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5015
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=447579
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=447579
4
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
5
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
6
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
7
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
8
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11063
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11063
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
11
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
12
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
14
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-51.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-51.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
16
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
17
reference_url http://www.securitytracker.com/id?1021191
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021191
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
20
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470876
reference_id 470876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470876
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015
reference_id CVE-2008-5015
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5015
reference_id CVE-2008-5015
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5015
31
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-51
reference_id mfsa2008-51
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-51
33
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
34
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
fixed_packages
aliases CVE-2008-5015
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-545b-g9k4-s7ej
1
url VCID-8pwa-cya9-h3c9
vulnerability_id VCID-8pwa-cya9-h3c9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5016.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5016.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5016
reference_id
reference_type
scores
0
value 0.21255
scoring_system epss
scoring_elements 0.9569
published_at 2026-04-18T12:55:00Z
1
value 0.21255
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-01T12:55:00Z
2
value 0.21255
scoring_system epss
scoring_elements 0.95678
published_at 2026-04-13T12:55:00Z
3
value 0.21255
scoring_system epss
scoring_elements 0.95686
published_at 2026-04-16T12:55:00Z
4
value 0.21255
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-02T12:55:00Z
5
value 0.21255
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-04T12:55:00Z
6
value 0.21255
scoring_system epss
scoring_elements 0.9566
published_at 2026-04-07T12:55:00Z
7
value 0.21255
scoring_system epss
scoring_elements 0.95668
published_at 2026-04-08T12:55:00Z
8
value 0.21255
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-09T12:55:00Z
9
value 0.21255
scoring_system epss
scoring_elements 0.95676
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5016
3
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=439206%2C453406%2C458637%2C444864%2C452157%2C449111%2C444260%2C457375%2C433429%2C443528%2C430394
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=439206%2C453406%2C458637%2C444864%2C452157%2C449111%2C444260%2C457375%2C433429%2C443528%2C430394
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
6
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
7
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
8
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
9
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
10
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
11
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11356
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11356
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
14
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
16
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
19
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
23
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
24
reference_url http://www.securitytracker.com/id?1021183
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021183
25
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
26
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
27
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470881
reference_id 470881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470881
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016
reference_id CVE-2008-5016
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5016
reference_id CVE-2008-5016
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5016
73
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
74
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
reference_id mfsa2008-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
75
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
76
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
77
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
78
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
79
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5016
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pwa-cya9-h3c9
2
url VCID-a6sj-8j83-yuf5
vulnerability_id VCID-a6sj-8j83-yuf5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5021.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5021
reference_id
reference_type
scores
0
value 0.23762
scoring_system epss
scoring_elements 0.96021
published_at 2026-04-18T12:55:00Z
1
value 0.23762
scoring_system epss
scoring_elements 0.96015
published_at 2026-04-16T12:55:00Z
2
value 0.23762
scoring_system epss
scoring_elements 0.96
published_at 2026-04-09T12:55:00Z
3
value 0.23762
scoring_system epss
scoring_elements 0.96003
published_at 2026-04-12T12:55:00Z
4
value 0.23762
scoring_system epss
scoring_elements 0.96006
published_at 2026-04-13T12:55:00Z
5
value 0.25259
scoring_system epss
scoring_elements 0.96184
published_at 2026-04-08T12:55:00Z
6
value 0.25259
scoring_system epss
scoring_elements 0.96155
published_at 2026-04-01T12:55:00Z
7
value 0.25259
scoring_system epss
scoring_elements 0.96163
published_at 2026-04-02T12:55:00Z
8
value 0.25259
scoring_system epss
scoring_elements 0.96171
published_at 2026-04-04T12:55:00Z
9
value 0.25259
scoring_system epss
scoring_elements 0.96174
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5021
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460002
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460002
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021186
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021186
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470894
reference_id 470894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470894
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021
reference_id CVE-2008-5021
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5021
reference_id CVE-2008-5021
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5021
64
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
65
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-55
reference_id mfsa2008-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-55
66
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
67
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
68
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
69
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
70
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5021
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sj-8j83-yuf5
3
url VCID-at1m-d43c-ryeb
vulnerability_id VCID-at1m-d43c-ryeb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5014
reference_id
reference_type
scores
0
value 0.25205
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-18T12:55:00Z
1
value 0.25205
scoring_system epss
scoring_elements 0.9615
published_at 2026-04-01T12:55:00Z
2
value 0.25205
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-13T12:55:00Z
3
value 0.25205
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-16T12:55:00Z
4
value 0.25205
scoring_system epss
scoring_elements 0.96158
published_at 2026-04-02T12:55:00Z
5
value 0.25205
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-04T12:55:00Z
6
value 0.25205
scoring_system epss
scoring_elements 0.96168
published_at 2026-04-07T12:55:00Z
7
value 0.25205
scoring_system epss
scoring_elements 0.96178
published_at 2026-04-08T12:55:00Z
8
value 0.25205
scoring_system epss
scoring_elements 0.96182
published_at 2026-04-09T12:55:00Z
9
value 0.25205
scoring_system epss
scoring_elements 0.96186
published_at 2026-04-11T12:55:00Z
10
value 0.25205
scoring_system epss
scoring_elements 0.96185
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5014
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=436741
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=436741
4
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
5
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
6
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
7
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
8
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021182
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021182
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470873
reference_id 470873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470873
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
reference_id CVE-2008-5014
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5014
reference_id CVE-2008-5014
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5014
51
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-50
reference_id mfsa2008-50
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-50
53
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
54
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
55
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
56
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
57
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5014
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-at1m-d43c-ryeb
4
url VCID-c6cb-9hbh-wkdb
vulnerability_id VCID-c6cb-9hbh-wkdb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5018.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5018.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5018
reference_id
reference_type
scores
0
value 0.20193
scoring_system epss
scoring_elements 0.95515
published_at 2026-04-18T12:55:00Z
1
value 0.20193
scoring_system epss
scoring_elements 0.95465
published_at 2026-04-01T12:55:00Z
2
value 0.20193
scoring_system epss
scoring_elements 0.95502
published_at 2026-04-13T12:55:00Z
3
value 0.20193
scoring_system epss
scoring_elements 0.9551
published_at 2026-04-16T12:55:00Z
4
value 0.20193
scoring_system epss
scoring_elements 0.95474
published_at 2026-04-02T12:55:00Z
5
value 0.20193
scoring_system epss
scoring_elements 0.9548
published_at 2026-04-04T12:55:00Z
6
value 0.20193
scoring_system epss
scoring_elements 0.95485
published_at 2026-04-07T12:55:00Z
7
value 0.20193
scoring_system epss
scoring_elements 0.95491
published_at 2026-04-08T12:55:00Z
8
value 0.20193
scoring_system epss
scoring_elements 0.95494
published_at 2026-04-09T12:55:00Z
9
value 0.20193
scoring_system epss
scoring_elements 0.95499
published_at 2026-04-11T12:55:00Z
10
value 0.20193
scoring_system epss
scoring_elements 0.95501
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5018
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=452786
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=452786
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872
19
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
20
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
22
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
23
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
24
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
29
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
33
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
34
reference_url http://www.securitytracker.com/id?1021183
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021183
35
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
36
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
37
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470884
reference_id 470884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470884
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018
reference_id CVE-2008-5018
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5018
reference_id CVE-2008-5018
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5018
49
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
reference_id mfsa2008-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
51
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
52
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
53
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
54
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
55
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5018
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6cb-9hbh-wkdb
5
url VCID-ckkx-8gup-97fv
vulnerability_id VCID-ckkx-8gup-97fv
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5052.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5052.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5052
reference_id
reference_type
scores
0
value 0.18653
scoring_system epss
scoring_elements 0.95284
published_at 2026-04-18T12:55:00Z
1
value 0.18653
scoring_system epss
scoring_elements 0.95234
published_at 2026-04-01T12:55:00Z
2
value 0.18653
scoring_system epss
scoring_elements 0.95246
published_at 2026-04-02T12:55:00Z
3
value 0.18653
scoring_system epss
scoring_elements 0.95249
published_at 2026-04-04T12:55:00Z
4
value 0.18653
scoring_system epss
scoring_elements 0.95253
published_at 2026-04-07T12:55:00Z
5
value 0.18653
scoring_system epss
scoring_elements 0.95261
published_at 2026-04-08T12:55:00Z
6
value 0.18653
scoring_system epss
scoring_elements 0.95263
published_at 2026-04-09T12:55:00Z
7
value 0.18653
scoring_system epss
scoring_elements 0.95268
published_at 2026-04-11T12:55:00Z
8
value 0.18653
scoring_system epss
scoring_elements 0.95269
published_at 2026-04-12T12:55:00Z
9
value 0.18653
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-13T12:55:00Z
10
value 0.18653
scoring_system epss
scoring_elements 0.9528
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5052
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=454113
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=454113
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
7
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
8
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
9
reference_url http://www.securitytracker.com/id?1021183
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021183
10
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
11
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618336
reference_id 1618336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618336
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5052
reference_id CVE-2008-5052
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5052
17
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
18
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
19
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
20
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
fixed_packages
aliases CVE-2008-5052
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckkx-8gup-97fv
6
url VCID-gpy3-z72m-uqd2
vulnerability_id VCID-gpy3-z72m-uqd2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5024.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5024.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5024
reference_id
reference_type
scores
0
value 0.07219
scoring_system epss
scoring_elements 0.91631
published_at 2026-04-18T12:55:00Z
1
value 0.07219
scoring_system epss
scoring_elements 0.91572
published_at 2026-04-01T12:55:00Z
2
value 0.07219
scoring_system epss
scoring_elements 0.91617
published_at 2026-04-13T12:55:00Z
3
value 0.07219
scoring_system epss
scoring_elements 0.91638
published_at 2026-04-16T12:55:00Z
4
value 0.07219
scoring_system epss
scoring_elements 0.9158
published_at 2026-04-02T12:55:00Z
5
value 0.07219
scoring_system epss
scoring_elements 0.91586
published_at 2026-04-04T12:55:00Z
6
value 0.07219
scoring_system epss
scoring_elements 0.91595
published_at 2026-04-07T12:55:00Z
7
value 0.07219
scoring_system epss
scoring_elements 0.91608
published_at 2026-04-08T12:55:00Z
8
value 0.07219
scoring_system epss
scoring_elements 0.91614
published_at 2026-04-09T12:55:00Z
9
value 0.07219
scoring_system epss
scoring_elements 0.91618
published_at 2026-04-11T12:55:00Z
10
value 0.07219
scoring_system epss
scoring_elements 0.9162
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5024
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=453915
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=453915
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-58.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021192
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021192
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470902
reference_id 470902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470902
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024
reference_id CVE-2008-5024
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5024
reference_id CVE-2008-5024
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5024
51
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-58
reference_id mfsa2008-58
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-58
53
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
54
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
55
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
56
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
57
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5024
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpy3-z72m-uqd2
7
url VCID-tgpx-pn6s-f3b7
vulnerability_id VCID-tgpx-pn6s-f3b7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5023.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5023.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5023
reference_id
reference_type
scores
0
value 0.1839
scoring_system epss
scoring_elements 0.95241
published_at 2026-04-18T12:55:00Z
1
value 0.1839
scoring_system epss
scoring_elements 0.95193
published_at 2026-04-01T12:55:00Z
2
value 0.1839
scoring_system epss
scoring_elements 0.95229
published_at 2026-04-13T12:55:00Z
3
value 0.1839
scoring_system epss
scoring_elements 0.95237
published_at 2026-04-16T12:55:00Z
4
value 0.1839
scoring_system epss
scoring_elements 0.95204
published_at 2026-04-02T12:55:00Z
5
value 0.1839
scoring_system epss
scoring_elements 0.95206
published_at 2026-04-04T12:55:00Z
6
value 0.1839
scoring_system epss
scoring_elements 0.95209
published_at 2026-04-07T12:55:00Z
7
value 0.1839
scoring_system epss
scoring_elements 0.95217
published_at 2026-04-08T12:55:00Z
8
value 0.1839
scoring_system epss
scoring_elements 0.95221
published_at 2026-04-09T12:55:00Z
9
value 0.1839
scoring_system epss
scoring_elements 0.95226
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5023
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=424733
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=424733
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
11
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
12
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
13
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
14
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908
16
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
19
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
20
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
21
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
24
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
27
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
28
reference_url http://www.securitytracker.com/id?1021189
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021189
29
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
30
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
31
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470898
reference_id 470898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470898
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023
reference_id CVE-2008-5023
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5023
reference_id CVE-2008-5023
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5023
42
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-57
reference_id mfsa2008-57
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-57
44
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
45
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
46
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
fixed_packages
aliases CVE-2008-5023
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgpx-pn6s-f3b7
8
url VCID-uteh-n9yy-63ha
vulnerability_id VCID-uteh-n9yy-63ha
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5019.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5019.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5019
reference_id
reference_type
scores
0
value 0.12823
scoring_system epss
scoring_elements 0.94048
published_at 2026-04-18T12:55:00Z
1
value 0.12823
scoring_system epss
scoring_elements 0.93989
published_at 2026-04-01T12:55:00Z
2
value 0.12823
scoring_system epss
scoring_elements 0.94027
published_at 2026-04-13T12:55:00Z
3
value 0.12823
scoring_system epss
scoring_elements 0.94043
published_at 2026-04-16T12:55:00Z
4
value 0.12823
scoring_system epss
scoring_elements 0.93998
published_at 2026-04-02T12:55:00Z
5
value 0.12823
scoring_system epss
scoring_elements 0.94007
published_at 2026-04-04T12:55:00Z
6
value 0.12823
scoring_system epss
scoring_elements 0.9401
published_at 2026-04-07T12:55:00Z
7
value 0.12823
scoring_system epss
scoring_elements 0.94018
published_at 2026-04-08T12:55:00Z
8
value 0.12823
scoring_system epss
scoring_elements 0.94022
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5019
3
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=459906%2C460983
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=459906%2C460983
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
10
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
11
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10943
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10943
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
14
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
16
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
19
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-53.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-53.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
22
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
23
reference_url http://www.securitytracker.com/id?1021184
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021184
24
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
25
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
26
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470889
reference_id 470889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470889
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019
reference_id CVE-2008-5019
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5019
reference_id CVE-2008-5019
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5019
36
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-53
reference_id mfsa2008-53
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-53
38
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
39
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
40
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
fixed_packages
aliases CVE-2008-5019
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uteh-n9yy-63ha
9
url VCID-x8d4-n1mm-qfcf
vulnerability_id VCID-x8d4-n1mm-qfcf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0017.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0017.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0017
reference_id
reference_type
scores
0
value 0.14498
scoring_system epss
scoring_elements 0.94468
published_at 2026-04-18T12:55:00Z
1
value 0.14498
scoring_system epss
scoring_elements 0.94411
published_at 2026-04-01T12:55:00Z
2
value 0.14498
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-13T12:55:00Z
3
value 0.14498
scoring_system epss
scoring_elements 0.94464
published_at 2026-04-16T12:55:00Z
4
value 0.14498
scoring_system epss
scoring_elements 0.94418
published_at 2026-04-02T12:55:00Z
5
value 0.14498
scoring_system epss
scoring_elements 0.94429
published_at 2026-04-04T12:55:00Z
6
value 0.14498
scoring_system epss
scoring_elements 0.94431
published_at 2026-04-07T12:55:00Z
7
value 0.14498
scoring_system epss
scoring_elements 0.94441
published_at 2026-04-08T12:55:00Z
8
value 0.14498
scoring_system epss
scoring_elements 0.94445
published_at 2026-04-09T12:55:00Z
9
value 0.14498
scoring_system epss
scoring_elements 0.94447
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0017
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=443299
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=443299
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
11
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
12
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
13
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
14
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
15
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005
17
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
19
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
20
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
21
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
22
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
23
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
24
reference_url http://www.iss.net/threats/311.html
reference_id
reference_type
scores
url http://www.iss.net/threats/311.html
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
27
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
30
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
31
reference_url http://www.securitytracker.com/id?1021185
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021185
32
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
33
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
34
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470892
reference_id 470892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470892
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017
reference_id CVE-2008-0017
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-0017
reference_id CVE-2008-0017
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-0017
46
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
47
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-54
reference_id mfsa2008-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-54
48
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
49
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
50
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
fixed_packages
aliases CVE-2008-0017
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8d4-n1mm-qfcf
10
url VCID-y5xk-xgwh-63cn
vulnerability_id VCID-y5xk-xgwh-63cn
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5022.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5022
reference_id
reference_type
scores
0
value 0.13446
scoring_system epss
scoring_elements 0.94222
published_at 2026-04-18T12:55:00Z
1
value 0.13446
scoring_system epss
scoring_elements 0.94159
published_at 2026-04-01T12:55:00Z
2
value 0.13446
scoring_system epss
scoring_elements 0.94202
published_at 2026-04-13T12:55:00Z
3
value 0.13446
scoring_system epss
scoring_elements 0.94217
published_at 2026-04-16T12:55:00Z
4
value 0.13446
scoring_system epss
scoring_elements 0.94168
published_at 2026-04-02T12:55:00Z
5
value 0.13446
scoring_system epss
scoring_elements 0.9418
published_at 2026-04-04T12:55:00Z
6
value 0.13446
scoring_system epss
scoring_elements 0.94183
published_at 2026-04-07T12:55:00Z
7
value 0.13446
scoring_system epss
scoring_elements 0.94192
published_at 2026-04-08T12:55:00Z
8
value 0.13446
scoring_system epss
scoring_elements 0.94196
published_at 2026-04-09T12:55:00Z
9
value 0.13446
scoring_system epss
scoring_elements 0.94201
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5022
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460002
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460002
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021188
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021188
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470895
reference_id 470895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470895
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022
reference_id CVE-2008-5022
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5022
reference_id CVE-2008-5022
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5022
51
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-56
reference_id mfsa2008-56
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-56
53
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
54
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
55
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
56
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
57
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5022
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5xk-xgwh-63cn
11
url VCID-yxzt-p8ke-g3c9
vulnerability_id VCID-yxzt-p8ke-g3c9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5017.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5017.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5017
reference_id
reference_type
scores
0
value 0.17422
scoring_system epss
scoring_elements 0.95083
published_at 2026-04-18T12:55:00Z
1
value 0.17422
scoring_system epss
scoring_elements 0.95037
published_at 2026-04-01T12:55:00Z
2
value 0.17422
scoring_system epss
scoring_elements 0.95071
published_at 2026-04-13T12:55:00Z
3
value 0.17422
scoring_system epss
scoring_elements 0.95081
published_at 2026-04-16T12:55:00Z
4
value 0.17422
scoring_system epss
scoring_elements 0.95048
published_at 2026-04-04T12:55:00Z
5
value 0.17422
scoring_system epss
scoring_elements 0.95051
published_at 2026-04-07T12:55:00Z
6
value 0.17422
scoring_system epss
scoring_elements 0.95058
published_at 2026-04-08T12:55:00Z
7
value 0.17422
scoring_system epss
scoring_elements 0.95062
published_at 2026-04-09T12:55:00Z
8
value 0.17422
scoring_system epss
scoring_elements 0.95067
published_at 2026-04-11T12:55:00Z
9
value 0.17422
scoring_system epss
scoring_elements 0.95068
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5017
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=455987
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=455987
4
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
5
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
6
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
7
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
8
reference_url http://secunia.com/advisories/32713
reference_id
reference_type
scores
url http://secunia.com/advisories/32713
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11436
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11436
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021183
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021183
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470883
reference_id 470883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470883
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017
reference_id CVE-2008-5017
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5017
reference_id CVE-2008-5017
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5017
51
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
reference_id mfsa2008-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-52
53
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
54
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
55
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
56
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
57
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
aliases CVE-2008-5017
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxzt-p8ke-g3c9
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9.0.4-1%3Farch=el5