Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@1.1.14
Typemozilla
Namespace
NameSeaMonkey
Version1.1.14
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.15
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-73rh-nbyu-8qeg
vulnerability_id VCID-73rh-nbyu-8qeg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5510
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-16T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77132
published_at 2026-04-01T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-12T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77193
published_at 2026-04-13T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77138
published_at 2026-04-02T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77167
published_at 2026-04-04T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.77149
published_at 2026-04-07T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-08T12:55:00Z
8
value 0.01018
scoring_system epss
scoring_elements 0.77191
published_at 2026-04-09T12:55:00Z
9
value 0.01018
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5510
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=228856
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=228856
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
7
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
8
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
9
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
10
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
11
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
12
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
13
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47415
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47415
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662
16
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
17
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
18
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
22
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
24
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
25
reference_url http://www.securitytracker.com/id?1021425
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021425
26
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
27
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
28
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476283
reference_id 476283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476283
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
reference_id CVE-2008-5510
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5510
reference_id CVE-2008-5510
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5510
40
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-67
reference_id mfsa2008-67
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-67
42
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
43
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
44
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
45
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
46
reference_url https://usn.ubuntu.com/717-3/
reference_id USN-717-3
reference_type
scores
url https://usn.ubuntu.com/717-3/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5510
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73rh-nbyu-8qeg
1
url VCID-eh6u-wqar-ubb7
vulnerability_id VCID-eh6u-wqar-ubb7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66884
published_at 2026-04-13T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66813
published_at 2026-04-01T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66931
published_at 2026-04-11T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-16T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-02T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66877
published_at 2026-04-04T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.6685
published_at 2026-04-07T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66898
published_at 2026-04-08T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66911
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
5
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
6
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
7
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
8
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
9
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
10
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
11
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021427
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021427
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476278
reference_id 476278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476278
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
reference_id mfsa2008-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
62
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
63
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5506
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh6u-wqar-ubb7
2
url VCID-p598-baeh-dkd7
vulnerability_id VCID-p598-baeh-dkd7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
reference_id
reference_type
scores
0
value 0.06165
scoring_system epss
scoring_elements 0.90854
published_at 2026-04-16T12:55:00Z
1
value 0.06165
scoring_system epss
scoring_elements 0.90781
published_at 2026-04-01T12:55:00Z
2
value 0.06165
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-12T12:55:00Z
3
value 0.06165
scoring_system epss
scoring_elements 0.90834
published_at 2026-04-13T12:55:00Z
4
value 0.06165
scoring_system epss
scoring_elements 0.90787
published_at 2026-04-02T12:55:00Z
5
value 0.06165
scoring_system epss
scoring_elements 0.90799
published_at 2026-04-04T12:55:00Z
6
value 0.06165
scoring_system epss
scoring_elements 0.9081
published_at 2026-04-07T12:55:00Z
7
value 0.06165
scoring_system epss
scoring_elements 0.90821
published_at 2026-04-08T12:55:00Z
8
value 0.06165
scoring_system epss
scoring_elements 0.90828
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476266
reference_id 476266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476266
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5500
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p598-baeh-dkd7
3
url VCID-q376-zeq4-m3ah
vulnerability_id VCID-q376-zeq4-m3ah
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44142
published_at 2026-04-16T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44059
published_at 2026-04-01T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44097
published_at 2026-04-12T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44081
published_at 2026-04-13T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44107
published_at 2026-04-02T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.4413
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44061
published_at 2026-04-07T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44112
published_at 2026-04-08T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44114
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
3
reference_url http://scary.beasts.org/security/CESA-2008-011.html
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2008-011.html
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/archive/1/499353/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/499353/100/0/threaded
38
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
39
reference_url http://www.securitytracker.com/id?1021423
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021423
40
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
41
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
42
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
43
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476280
reference_id 476280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476280
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
56
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
reference_id mfsa2008-65
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
58
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
59
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
60
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
61
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
62
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
63
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
64
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
65
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5507
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q376-zeq4-m3ah
4
url VCID-r79k-3rkt-6fa8
vulnerability_id VCID-r79k-3rkt-6fa8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
reference_id
reference_type
scores
0
value 0.01017
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-16T12:55:00Z
1
value 0.01017
scoring_system epss
scoring_elements 0.77116
published_at 2026-04-01T12:55:00Z
2
value 0.01017
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-12T12:55:00Z
3
value 0.01017
scoring_system epss
scoring_elements 0.77177
published_at 2026-04-13T12:55:00Z
4
value 0.01017
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-02T12:55:00Z
5
value 0.01017
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-04T12:55:00Z
6
value 0.01017
scoring_system epss
scoring_elements 0.77134
published_at 2026-04-07T12:55:00Z
7
value 0.01017
scoring_system epss
scoring_elements 0.77166
published_at 2026-04-08T12:55:00Z
8
value 0.01017
scoring_system epss
scoring_elements 0.77175
published_at 2026-04-09T12:55:00Z
9
value 0.01017
scoring_system epss
scoring_elements 0.77202
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021418
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021418
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476285
reference_id 476285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476285
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
reference_id mfsa2008-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5511
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r79k-3rkt-6fa8
5
url VCID-rjzx-gx6e-23ff
vulnerability_id VCID-rjzx-gx6e-23ff
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
reference_id
reference_type
scores
0
value 0.02182
scoring_system epss
scoring_elements 0.84378
published_at 2026-04-16T12:55:00Z
1
value 0.02182
scoring_system epss
scoring_elements 0.84288
published_at 2026-04-01T12:55:00Z
2
value 0.02182
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-12T12:55:00Z
3
value 0.02182
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-13T12:55:00Z
4
value 0.02182
scoring_system epss
scoring_elements 0.84301
published_at 2026-04-02T12:55:00Z
5
value 0.02182
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-04T12:55:00Z
6
value 0.02182
scoring_system epss
scoring_elements 0.84323
published_at 2026-04-07T12:55:00Z
7
value 0.02182
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-08T12:55:00Z
8
value 0.02182
scoring_system epss
scoring_elements 0.8435
published_at 2026-04-09T12:55:00Z
9
value 0.02182
scoring_system epss
scoring_elements 0.84368
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021426
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021426
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476281
reference_id 476281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476281
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
reference_id mfsa2008-66
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
62
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5508
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjzx-gx6e-23ff
6
url VCID-wjmb-tuta-2qc4
vulnerability_id VCID-wjmb-tuta-2qc4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5503
reference_id
reference_type
scores
0
value 0.01234
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-16T12:55:00Z
1
value 0.01234
scoring_system epss
scoring_elements 0.79139
published_at 2026-04-01T12:55:00Z
2
value 0.01234
scoring_system epss
scoring_elements 0.79199
published_at 2026-04-12T12:55:00Z
3
value 0.01234
scoring_system epss
scoring_elements 0.79191
published_at 2026-04-13T12:55:00Z
4
value 0.01234
scoring_system epss
scoring_elements 0.79146
published_at 2026-04-02T12:55:00Z
5
value 0.01234
scoring_system epss
scoring_elements 0.79171
published_at 2026-04-04T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79156
published_at 2026-04-07T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79182
published_at 2026-04-08T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.7919
published_at 2026-04-09T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79214
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5503
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=379959
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=379959
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
6
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
7
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
8
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
9
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
10
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
11
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
12
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
13
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
14
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
15
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
16
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
17
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47409
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47409
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
22
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
23
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
24
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
25
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
28
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
31
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
32
reference_url http://www.securitytracker.com/id?1021424
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021424
33
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
34
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
35
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
36
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476272
reference_id 476272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476272
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
reference_id CVE-2008-5503
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5503
reference_id CVE-2008-5503
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5503
94
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
95
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-61
reference_id mfsa2008-61
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-61
96
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
97
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
98
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
99
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
100
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
101
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.14
purl pkg:mozilla/SeaMonkey@1.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14
aliases CVE-2008-5503
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjmb-tuta-2qc4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.14