Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@1.1.8
Typemozilla
Namespace
NameSeaMonkey
Version1.1.8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.9
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3tuj-c9xa-e3aj
vulnerability_id VCID-3tuj-c9xa-e3aj
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0416
reference_id
reference_type
scores
0
value 0.08734
scoring_system epss
scoring_elements 0.92518
published_at 2026-04-26T12:55:00Z
1
value 0.08734
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-01T12:55:00Z
2
value 0.08734
scoring_system epss
scoring_elements 0.92467
published_at 2026-04-02T12:55:00Z
3
value 0.08734
scoring_system epss
scoring_elements 0.92476
published_at 2026-04-04T12:55:00Z
4
value 0.08734
scoring_system epss
scoring_elements 0.92479
published_at 2026-04-07T12:55:00Z
5
value 0.08734
scoring_system epss
scoring_elements 0.92491
published_at 2026-04-08T12:55:00Z
6
value 0.08734
scoring_system epss
scoring_elements 0.92495
published_at 2026-04-09T12:55:00Z
7
value 0.08734
scoring_system epss
scoring_elements 0.92501
published_at 2026-04-11T12:55:00Z
8
value 0.08734
scoring_system epss
scoring_elements 0.92503
published_at 2026-04-12T12:55:00Z
9
value 0.08734
scoring_system epss
scoring_elements 0.92502
published_at 2026-04-13T12:55:00Z
10
value 0.08734
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-18T12:55:00Z
11
value 0.08734
scoring_system epss
scoring_elements 0.92515
published_at 2026-04-21T12:55:00Z
12
value 0.08734
scoring_system epss
scoring_elements 0.92517
published_at 2026-04-24T12:55:00Z
13
value 0.09262
scoring_system epss
scoring_elements 0.92747
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0416
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431740
reference_id 431740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431740
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416
reference_id CVE-2008-0416
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-13
reference_id mfsa2008-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-13
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
9
reference_url https://usn.ubuntu.com/592-1/
reference_id USN-592-1
reference_type
scores
url https://usn.ubuntu.com/592-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0416
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tuj-c9xa-e3aj
1
url VCID-8h4q-2ubw-vudu
vulnerability_id VCID-8h4q-2ubw-vudu
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0414
reference_id
reference_type
scores
0
value 0.01906
scoring_system epss
scoring_elements 0.83347
published_at 2026-04-29T12:55:00Z
1
value 0.01906
scoring_system epss
scoring_elements 0.83203
published_at 2026-04-01T12:55:00Z
2
value 0.01906
scoring_system epss
scoring_elements 0.83219
published_at 2026-04-02T12:55:00Z
3
value 0.01906
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-04T12:55:00Z
4
value 0.01906
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-07T12:55:00Z
5
value 0.01906
scoring_system epss
scoring_elements 0.83257
published_at 2026-04-08T12:55:00Z
6
value 0.01906
scoring_system epss
scoring_elements 0.83266
published_at 2026-04-09T12:55:00Z
7
value 0.01906
scoring_system epss
scoring_elements 0.83282
published_at 2026-04-11T12:55:00Z
8
value 0.01906
scoring_system epss
scoring_elements 0.83276
published_at 2026-04-12T12:55:00Z
9
value 0.01906
scoring_system epss
scoring_elements 0.83272
published_at 2026-04-13T12:55:00Z
10
value 0.01906
scoring_system epss
scoring_elements 0.83308
published_at 2026-04-16T12:55:00Z
11
value 0.01906
scoring_system epss
scoring_elements 0.83309
published_at 2026-04-18T12:55:00Z
12
value 0.01906
scoring_system epss
scoring_elements 0.83311
published_at 2026-04-21T12:55:00Z
13
value 0.01906
scoring_system epss
scoring_elements 0.83334
published_at 2026-04-24T12:55:00Z
14
value 0.01906
scoring_system epss
scoring_elements 0.83341
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0414
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432040
reference_id 432040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432040
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
reference_id CVE-2008-0414
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-02
reference_id mfsa2008-02
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-02
6
reference_url https://access.redhat.com/errata/RHSA-2008:0208
reference_id RHSA-2008:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0208
7
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0414
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4q-2ubw-vudu
2
url VCID-8r7s-6f5v-67f7
vulnerability_id VCID-8r7s-6f5v-67f7
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0420
reference_id
reference_type
scores
0
value 0.02828
scoring_system epss
scoring_elements 0.8622
published_at 2026-04-29T12:55:00Z
1
value 0.02828
scoring_system epss
scoring_elements 0.86109
published_at 2026-04-01T12:55:00Z
2
value 0.02828
scoring_system epss
scoring_elements 0.86119
published_at 2026-04-02T12:55:00Z
3
value 0.02828
scoring_system epss
scoring_elements 0.86135
published_at 2026-04-07T12:55:00Z
4
value 0.02828
scoring_system epss
scoring_elements 0.86154
published_at 2026-04-08T12:55:00Z
5
value 0.02828
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-09T12:55:00Z
6
value 0.02828
scoring_system epss
scoring_elements 0.8618
published_at 2026-04-11T12:55:00Z
7
value 0.02828
scoring_system epss
scoring_elements 0.86178
published_at 2026-04-12T12:55:00Z
8
value 0.02828
scoring_system epss
scoring_elements 0.86174
published_at 2026-04-13T12:55:00Z
9
value 0.02828
scoring_system epss
scoring_elements 0.86191
published_at 2026-04-16T12:55:00Z
10
value 0.02828
scoring_system epss
scoring_elements 0.86197
published_at 2026-04-18T12:55:00Z
11
value 0.02828
scoring_system epss
scoring_elements 0.86188
published_at 2026-04-21T12:55:00Z
12
value 0.02828
scoring_system epss
scoring_elements 0.8621
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0420
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431750
reference_id 431750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431750
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420
reference_id CVE-2008-0420
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-07
reference_id mfsa2008-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-07
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
10
reference_url https://usn.ubuntu.com/582-1/
reference_id USN-582-1
reference_type
scores
url https://usn.ubuntu.com/582-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0420
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7s-6f5v-67f7
3
url VCID-ea68-57qy-1kax
vulnerability_id VCID-ea68-57qy-1kax
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0415
reference_id
reference_type
scores
0
value 0.02001
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-29T12:55:00Z
1
value 0.02001
scoring_system epss
scoring_elements 0.83595
published_at 2026-04-01T12:55:00Z
2
value 0.02001
scoring_system epss
scoring_elements 0.83607
published_at 2026-04-02T12:55:00Z
3
value 0.02001
scoring_system epss
scoring_elements 0.83622
published_at 2026-04-04T12:55:00Z
4
value 0.02001
scoring_system epss
scoring_elements 0.83624
published_at 2026-04-07T12:55:00Z
5
value 0.02001
scoring_system epss
scoring_elements 0.83648
published_at 2026-04-08T12:55:00Z
6
value 0.02001
scoring_system epss
scoring_elements 0.83655
published_at 2026-04-09T12:55:00Z
7
value 0.02001
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-11T12:55:00Z
8
value 0.02001
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-12T12:55:00Z
9
value 0.02001
scoring_system epss
scoring_elements 0.8366
published_at 2026-04-13T12:55:00Z
10
value 0.02001
scoring_system epss
scoring_elements 0.83695
published_at 2026-04-16T12:55:00Z
11
value 0.02001
scoring_system epss
scoring_elements 0.83696
published_at 2026-04-21T12:55:00Z
12
value 0.02001
scoring_system epss
scoring_elements 0.83721
published_at 2026-04-24T12:55:00Z
13
value 0.02001
scoring_system epss
scoring_elements 0.83728
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0415
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431739
reference_id 431739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431739
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
reference_id CVE-2008-0415
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-03
reference_id mfsa2008-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-03
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
10
reference_url https://usn.ubuntu.com/582-1/
reference_id USN-582-1
reference_type
scores
url https://usn.ubuntu.com/582-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0415
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ea68-57qy-1kax
4
url VCID-fzxh-1prr-c7et
vulnerability_id VCID-fzxh-1prr-c7et
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0304
reference_id
reference_type
scores
0
value 0.30512
scoring_system epss
scoring_elements 0.96724
published_at 2026-04-29T12:55:00Z
1
value 0.30512
scoring_system epss
scoring_elements 0.96676
published_at 2026-04-01T12:55:00Z
2
value 0.30512
scoring_system epss
scoring_elements 0.96686
published_at 2026-04-02T12:55:00Z
3
value 0.30512
scoring_system epss
scoring_elements 0.96689
published_at 2026-04-04T12:55:00Z
4
value 0.30512
scoring_system epss
scoring_elements 0.96693
published_at 2026-04-07T12:55:00Z
5
value 0.30512
scoring_system epss
scoring_elements 0.96701
published_at 2026-04-08T12:55:00Z
6
value 0.30512
scoring_system epss
scoring_elements 0.96702
published_at 2026-04-09T12:55:00Z
7
value 0.30512
scoring_system epss
scoring_elements 0.96705
published_at 2026-04-12T12:55:00Z
8
value 0.30512
scoring_system epss
scoring_elements 0.96708
published_at 2026-04-13T12:55:00Z
9
value 0.30512
scoring_system epss
scoring_elements 0.96714
published_at 2026-04-16T12:55:00Z
10
value 0.30512
scoring_system epss
scoring_elements 0.96718
published_at 2026-04-18T12:55:00Z
11
value 0.30512
scoring_system epss
scoring_elements 0.96721
published_at 2026-04-21T12:55:00Z
12
value 0.30512
scoring_system epss
scoring_elements 0.9672
published_at 2026-04-24T12:55:00Z
13
value 0.30512
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=435123
reference_id 435123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=435123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304
reference_id CVE-2008-0304
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-12
reference_id mfsa2008-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-12
6
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
7
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
8
reference_url https://usn.ubuntu.com/582-1/
reference_id USN-582-1
reference_type
scores
url https://usn.ubuntu.com/582-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0304
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzxh-1prr-c7et
5
url VCID-h91r-2kyx-v7f8
vulnerability_id VCID-h91r-2kyx-v7f8
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0419
reference_id
reference_type
scores
0
value 0.18686
scoring_system epss
scoring_elements 0.95296
published_at 2026-04-29T12:55:00Z
1
value 0.18686
scoring_system epss
scoring_elements 0.9524
published_at 2026-04-01T12:55:00Z
2
value 0.18686
scoring_system epss
scoring_elements 0.95252
published_at 2026-04-02T12:55:00Z
3
value 0.18686
scoring_system epss
scoring_elements 0.95255
published_at 2026-04-04T12:55:00Z
4
value 0.18686
scoring_system epss
scoring_elements 0.9526
published_at 2026-04-07T12:55:00Z
5
value 0.18686
scoring_system epss
scoring_elements 0.95267
published_at 2026-04-08T12:55:00Z
6
value 0.18686
scoring_system epss
scoring_elements 0.9527
published_at 2026-04-09T12:55:00Z
7
value 0.18686
scoring_system epss
scoring_elements 0.95275
published_at 2026-04-12T12:55:00Z
8
value 0.18686
scoring_system epss
scoring_elements 0.95278
published_at 2026-04-13T12:55:00Z
9
value 0.18686
scoring_system epss
scoring_elements 0.95286
published_at 2026-04-16T12:55:00Z
10
value 0.18686
scoring_system epss
scoring_elements 0.95291
published_at 2026-04-18T12:55:00Z
11
value 0.18686
scoring_system epss
scoring_elements 0.95293
published_at 2026-04-21T12:55:00Z
12
value 0.18686
scoring_system epss
scoring_elements 0.95294
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0419
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431749
reference_id 431749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431749
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
reference_id CVE-2008-0419
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-06
reference_id mfsa2008-06
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-06
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0419
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h91r-2kyx-v7f8
6
url VCID-pkeq-w64f-5bda
vulnerability_id VCID-pkeq-w64f-5bda
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0418
reference_id
reference_type
scores
0
value 0.38662
scoring_system epss
scoring_elements 0.97265
published_at 2026-04-29T12:55:00Z
1
value 0.38662
scoring_system epss
scoring_elements 0.97222
published_at 2026-04-01T12:55:00Z
2
value 0.38662
scoring_system epss
scoring_elements 0.97228
published_at 2026-04-02T12:55:00Z
3
value 0.38662
scoring_system epss
scoring_elements 0.97233
published_at 2026-04-04T12:55:00Z
4
value 0.38662
scoring_system epss
scoring_elements 0.97234
published_at 2026-04-07T12:55:00Z
5
value 0.38662
scoring_system epss
scoring_elements 0.97243
published_at 2026-04-08T12:55:00Z
6
value 0.38662
scoring_system epss
scoring_elements 0.97244
published_at 2026-04-09T12:55:00Z
7
value 0.38662
scoring_system epss
scoring_elements 0.97248
published_at 2026-04-11T12:55:00Z
8
value 0.38662
scoring_system epss
scoring_elements 0.97249
published_at 2026-04-13T12:55:00Z
9
value 0.38662
scoring_system epss
scoring_elements 0.97257
published_at 2026-04-16T12:55:00Z
10
value 0.38662
scoring_system epss
scoring_elements 0.97259
published_at 2026-04-18T12:55:00Z
11
value 0.38662
scoring_system epss
scoring_elements 0.97263
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0418
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431748
reference_id 431748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431748
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
reference_id CVE-2008-0418
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt
reference_id CVE-2008-0418;OSVDB-41187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt
5
reference_url https://www.securityfocus.com/bid/27406/info
reference_id CVE-2008-0418;OSVDB-41187
reference_type exploit
scores
url https://www.securityfocus.com/bid/27406/info
6
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-05
reference_id mfsa2008-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-05
8
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
9
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
10
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
11
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
12
reference_url https://usn.ubuntu.com/582-1/
reference_id USN-582-1
reference_type
scores
url https://usn.ubuntu.com/582-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0418
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkeq-w64f-5bda
7
url VCID-vrc7-3rm4-b3fk
vulnerability_id VCID-vrc7-3rm4-b3fk
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0593
reference_id
reference_type
scores
0
value 0.01092
scoring_system epss
scoring_elements 0.78037
published_at 2026-04-29T12:55:00Z
1
value 0.01092
scoring_system epss
scoring_elements 0.77898
published_at 2026-04-01T12:55:00Z
2
value 0.01092
scoring_system epss
scoring_elements 0.77905
published_at 2026-04-02T12:55:00Z
3
value 0.01092
scoring_system epss
scoring_elements 0.77932
published_at 2026-04-04T12:55:00Z
4
value 0.01092
scoring_system epss
scoring_elements 0.77915
published_at 2026-04-07T12:55:00Z
5
value 0.01092
scoring_system epss
scoring_elements 0.77942
published_at 2026-04-08T12:55:00Z
6
value 0.01092
scoring_system epss
scoring_elements 0.77946
published_at 2026-04-09T12:55:00Z
7
value 0.01092
scoring_system epss
scoring_elements 0.77973
published_at 2026-04-11T12:55:00Z
8
value 0.01092
scoring_system epss
scoring_elements 0.77958
published_at 2026-04-12T12:55:00Z
9
value 0.01092
scoring_system epss
scoring_elements 0.77956
published_at 2026-04-13T12:55:00Z
10
value 0.01092
scoring_system epss
scoring_elements 0.77991
published_at 2026-04-16T12:55:00Z
11
value 0.01092
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-18T12:55:00Z
12
value 0.01092
scoring_system epss
scoring_elements 0.77983
published_at 2026-04-21T12:55:00Z
13
value 0.01092
scoring_system epss
scoring_elements 0.78016
published_at 2026-04-24T12:55:00Z
14
value 0.01092
scoring_system epss
scoring_elements 0.78023
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0593
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431756
reference_id 431756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
reference_id CVE-2008-0593
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-10
reference_id mfsa2008-10
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-10
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0593
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrc7-3rm4-b3fk
8
url VCID-vvtb-nt5x-3yh9
vulnerability_id VCID-vvtb-nt5x-3yh9
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0412
reference_id
reference_type
scores
0
value 0.11553
scoring_system epss
scoring_elements 0.93663
published_at 2026-04-29T12:55:00Z
1
value 0.11553
scoring_system epss
scoring_elements 0.93595
published_at 2026-04-01T12:55:00Z
2
value 0.11553
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-02T12:55:00Z
3
value 0.11553
scoring_system epss
scoring_elements 0.93614
published_at 2026-04-04T12:55:00Z
4
value 0.11553
scoring_system epss
scoring_elements 0.93615
published_at 2026-04-07T12:55:00Z
5
value 0.11553
scoring_system epss
scoring_elements 0.93624
published_at 2026-04-08T12:55:00Z
6
value 0.11553
scoring_system epss
scoring_elements 0.93627
published_at 2026-04-09T12:55:00Z
7
value 0.11553
scoring_system epss
scoring_elements 0.93632
published_at 2026-04-12T12:55:00Z
8
value 0.11553
scoring_system epss
scoring_elements 0.93633
published_at 2026-04-13T12:55:00Z
9
value 0.11553
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-16T12:55:00Z
10
value 0.11553
scoring_system epss
scoring_elements 0.93657
published_at 2026-04-18T12:55:00Z
11
value 0.11553
scoring_system epss
scoring_elements 0.93662
published_at 2026-04-21T12:55:00Z
12
value 0.11553
scoring_system epss
scoring_elements 0.93666
published_at 2026-04-24T12:55:00Z
13
value 0.11553
scoring_system epss
scoring_elements 0.93665
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0412
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431732
reference_id 431732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431732
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
reference_id CVE-2008-0412
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-01
reference_id mfsa2008-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-01
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
10
reference_url https://usn.ubuntu.com/582-1/
reference_id USN-582-1
reference_type
scores
url https://usn.ubuntu.com/582-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0412
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvtb-nt5x-3yh9
9
url VCID-xv3s-67bq-1ugj
vulnerability_id VCID-xv3s-67bq-1ugj
summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0592
reference_id
reference_type
scores
0
value 0.03401
scoring_system epss
scoring_elements 0.87456
published_at 2026-04-29T12:55:00Z
1
value 0.03401
scoring_system epss
scoring_elements 0.87366
published_at 2026-04-01T12:55:00Z
2
value 0.03401
scoring_system epss
scoring_elements 0.87376
published_at 2026-04-02T12:55:00Z
3
value 0.03401
scoring_system epss
scoring_elements 0.87391
published_at 2026-04-07T12:55:00Z
4
value 0.03401
scoring_system epss
scoring_elements 0.87409
published_at 2026-04-08T12:55:00Z
5
value 0.03401
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-09T12:55:00Z
6
value 0.03401
scoring_system epss
scoring_elements 0.87429
published_at 2026-04-11T12:55:00Z
7
value 0.03401
scoring_system epss
scoring_elements 0.87424
published_at 2026-04-12T12:55:00Z
8
value 0.03401
scoring_system epss
scoring_elements 0.8742
published_at 2026-04-13T12:55:00Z
9
value 0.03401
scoring_system epss
scoring_elements 0.87435
published_at 2026-04-16T12:55:00Z
10
value 0.03401
scoring_system epss
scoring_elements 0.87437
published_at 2026-04-18T12:55:00Z
11
value 0.03401
scoring_system epss
scoring_elements 0.87432
published_at 2026-04-21T12:55:00Z
12
value 0.03401
scoring_system epss
scoring_elements 0.87449
published_at 2026-04-24T12:55:00Z
13
value 0.03401
scoring_system epss
scoring_elements 0.87455
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0592
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431752
reference_id 431752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431752
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
reference_id CVE-2008-0592
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
4
reference_url https://security.gentoo.org/glsa/200805-18
reference_id GLSA-200805-18
reference_type
scores
url https://security.gentoo.org/glsa/200805-18
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-09
reference_id mfsa2008-09
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-09
6
reference_url https://access.redhat.com/errata/RHSA-2008:0103
reference_id RHSA-2008:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0103
7
reference_url https://access.redhat.com/errata/RHSA-2008:0104
reference_id RHSA-2008:0104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0104
8
reference_url https://access.redhat.com/errata/RHSA-2008:0105
reference_id RHSA-2008:0105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0105
9
reference_url https://usn.ubuntu.com/576-1/
reference_id USN-576-1
reference_type
scores
url https://usn.ubuntu.com/576-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.8
purl pkg:mozilla/SeaMonkey@1.1.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8
aliases CVE-2008-0592
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv3s-67bq-1ugj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.8