Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/128793?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/128793?format=api", "purl": "pkg:rpm/redhat/xulrunner@1.9.0.4-1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "xulrunner", "version": "1.9.0.4-1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52111?format=api", "vulnerability_id": "VCID-545b-g9k4-s7ej", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5015.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5015.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5015", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90442", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90434", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90389", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90401", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90406", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.9042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05714", "scoring_system": "epss", "scoring_elements": "0.90426", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5015" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=447579", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=447579" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11063" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-51.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-51.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021191" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470876", "reference_id": "470876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470876" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015", "reference_id": "CVE-2008-5015", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5015", "reference_id": "CVE-2008-5015", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5015" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-51", "reference_id": "mfsa2008-51", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5015" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-545b-g9k4-s7ej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52121?format=api", "vulnerability_id": "VCID-8pwa-cya9-h3c9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5016.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5016.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5016", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95678", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95651", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.9566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21255", "scoring_system": "epss", "scoring_elements": "0.95672", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5016" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=439206%2C453406%2C458637%2C444864%2C452157%2C449111%2C444260%2C457375%2C433429%2C443528%2C430394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=439206%2C453406%2C458637%2C444864%2C452157%2C449111%2C444260%2C457375%2C433429%2C443528%2C430394" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11356" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021183" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470881", "reference_id": "470881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470881" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016", "reference_id": "CVE-2008-5016", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5016", "reference_id": "CVE-2008-5016", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5016" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52", "reference_id": "mfsa2008-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5016" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pwa-cya9-h3c9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52157?format=api", "vulnerability_id": "VCID-a6sj-8j83-yuf5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5021.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23762", "scoring_system": "epss", "scoring_elements": "0.96006", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23762", "scoring_system": "epss", "scoring_elements": "0.96015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23762", "scoring_system": "epss", "scoring_elements": "0.96", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23762", "scoring_system": "epss", "scoring_elements": "0.96003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25259", "scoring_system": "epss", "scoring_elements": "0.96184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25259", "scoring_system": "epss", "scoring_elements": "0.96174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25259", "scoring_system": "epss", "scoring_elements": "0.96155", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25259", "scoring_system": "epss", "scoring_elements": "0.96163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25259", "scoring_system": "epss", "scoring_elements": "0.96171", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5021" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=460002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=460002" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-55.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021186" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470894", "reference_id": "470894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470894" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021", "reference_id": "CVE-2008-5021", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5021", "reference_id": "CVE-2008-5021", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5021" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-55", "reference_id": "mfsa2008-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-55" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5021" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sj-8j83-yuf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52102?format=api", "vulnerability_id": "VCID-at1m-d43c-ryeb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5014", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96197", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.9615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96188", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96168", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25205", "scoring_system": "epss", "scoring_elements": "0.96186", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5014" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=436741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=436741" }, { "reference_url": "http://secunia.com/advisories/32011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32011" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-50.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-50.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021182", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021182" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470873", "reference_id": "470873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470873" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014", "reference_id": "CVE-2008-5014", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5014", "reference_id": "CVE-2008-5014", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5014" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-50", "reference_id": "mfsa2008-50", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-50" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5014" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-at1m-d43c-ryeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52143?format=api", "vulnerability_id": "VCID-c6cb-9hbh-wkdb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5018.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5018.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5018", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.9551", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95465", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.9548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95491", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20193", "scoring_system": "epss", "scoring_elements": "0.95499", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5018" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=452786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=452786" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021183" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470884", "reference_id": "470884", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470884" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018", "reference_id": "CVE-2008-5018", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5018", "reference_id": "CVE-2008-5018", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5018" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52", "reference_id": "mfsa2008-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5018" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6cb-9hbh-wkdb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52195?format=api", "vulnerability_id": "VCID-ckkx-8gup-97fv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5052.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.9528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95234", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95253", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95261", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18653", "scoring_system": "epss", "scoring_elements": "0.95272", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5052" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=454113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=454113" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9449" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021183" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618336", "reference_id": "1618336", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618336" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5052", "reference_id": "CVE-2008-5052", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5052" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5052" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckkx-8gup-97fv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52187?format=api", "vulnerability_id": "VCID-gpy3-z72m-uqd2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5024.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5024.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5024", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91638", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91572", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.9162", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.9158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91586", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07219", "scoring_system": "epss", "scoring_elements": "0.91618", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5024" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=453915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=453915" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-58.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-58.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021192" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470902", "reference_id": "470902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470902" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024", "reference_id": "CVE-2008-5024", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5024", "reference_id": "CVE-2008-5024", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5024" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-58", "reference_id": "mfsa2008-58", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-58" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5024" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpy3-z72m-uqd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52180?format=api", "vulnerability_id": "VCID-tgpx-pn6s-f3b7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5023.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5023.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5023", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95237", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95193", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95204", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95217", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1839", "scoring_system": "epss", "scoring_elements": "0.95221", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5023" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=424733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=424733" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-57.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-57.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021189" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470898", "reference_id": "470898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470898" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023", "reference_id": "CVE-2008-5023", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5023", "reference_id": "CVE-2008-5023", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5023" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-57", "reference_id": "mfsa2008-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5023" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgpx-pn6s-f3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52150?format=api", "vulnerability_id": "VCID-uteh-n9yy-63ha", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5019.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5019.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5019", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.94043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.93989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.94022", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.94027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.93998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.94007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.9401", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12823", "scoring_system": "epss", "scoring_elements": "0.94018", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5019" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=459906%2C460983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=459906%2C460983" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10943" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-53.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-53.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021184", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021184" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470889", "reference_id": "470889", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470889" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019", "reference_id": "CVE-2008-5019", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5019", "reference_id": "CVE-2008-5019", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5019" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-53", "reference_id": "mfsa2008-53", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-53" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5019" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uteh-n9yy-63ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52013?format=api", "vulnerability_id": "VCID-x8d4-n1mm-qfcf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0017.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0017.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0017", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94447", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94429", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14498", "scoring_system": "epss", "scoring_elements": "0.94445", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0017" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=443299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=443299" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.iss.net/threats/311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.iss.net/threats/311.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-54.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-54.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021185" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470892", "reference_id": "470892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470892" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017", "reference_id": "CVE-2008-0017", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0017", "reference_id": "CVE-2008-0017", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0017" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-54", "reference_id": "mfsa2008-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-0017" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8d4-n1mm-qfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52168?format=api", "vulnerability_id": "VCID-y5xk-xgwh-63cn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5022.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94202", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.9418", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13446", "scoring_system": "epss", "scoring_elements": "0.94196", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5022" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=460002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=460002" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-56.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-56.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021188" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470895", "reference_id": "470895", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470895" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022", "reference_id": "CVE-2008-5022", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5022", "reference_id": "CVE-2008-5022", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5022" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-56", "reference_id": "mfsa2008-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5022" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5xk-xgwh-63cn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52132?format=api", "vulnerability_id": "VCID-yxzt-p8ke-g3c9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5017.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5017.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5017", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95081", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95037", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95048", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95058", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17422", "scoring_system": "epss", "scoring_elements": "0.95067", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5017" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=455987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=455987" }, { "reference_url": "http://secunia.com/advisories/32684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32684" }, { "reference_url": "http://secunia.com/advisories/32693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32693" }, { "reference_url": "http://secunia.com/advisories/32694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32694" }, { "reference_url": "http://secunia.com/advisories/32695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32695" }, { "reference_url": "http://secunia.com/advisories/32713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32713" }, { "reference_url": "http://secunia.com/advisories/32714", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32714" }, { "reference_url": "http://secunia.com/advisories/32715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32715" }, { "reference_url": "http://secunia.com/advisories/32721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32721" }, { "reference_url": "http://secunia.com/advisories/32778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32778" }, { "reference_url": "http://secunia.com/advisories/32798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32798" }, { "reference_url": "http://secunia.com/advisories/32845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32845" }, { "reference_url": "http://secunia.com/advisories/32853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32853" }, { "reference_url": "http://secunia.com/advisories/33433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33433" }, { "reference_url": "http://secunia.com/advisories/33434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33434" }, { "reference_url": "http://secunia.com/advisories/34501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34501" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11436", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11436" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html" }, { "reference_url": "http://ubuntu.com/usn/usn-667-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-667-1" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1669" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1671" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1696" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1697" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:235" }, { "reference_url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-52.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0976.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0977.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0978.html" }, { "reference_url": "http://www.securityfocus.com/bid/32281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32281" }, { "reference_url": "http://www.securitytracker.com/id?1021183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021183" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3146" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470883", "reference_id": "470883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470883" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017", "reference_id": "CVE-2008-5017", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5017", "reference_id": "CVE-2008-5017", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5017" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52", "reference_id": "mfsa2008-52", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0976", "reference_id": "RHSA-2008:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0977", "reference_id": "RHSA-2008:0977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0978", "reference_id": "RHSA-2008:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0978" }, { "reference_url": "https://usn.ubuntu.com/667-1/", "reference_id": "USN-667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/667-1/" }, { "reference_url": "https://usn.ubuntu.com/668-1/", "reference_id": "USN-668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/668-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5017" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxzt-p8ke-g3c9" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9.0.4-1%3Farch=el5" }