Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox@3.0.2
Typemozilla
Namespace
NameFirefox
Version3.0.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.4
Latest_non_vulnerable_version150.0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2q2b-6j3y-e7gb
vulnerability_id VCID-2q2b-6j3y-e7gb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://download.novell.com/Download?buildid=WZXONb-tqBw~
reference_id
reference_type
scores
url http://download.novell.com/Download?buildid=WZXONb-tqBw~
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3837.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3837.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3837
reference_id
reference_type
scores
0
value 0.03669
scoring_system epss
scoring_elements 0.87937
published_at 2026-04-29T12:55:00Z
1
value 0.03669
scoring_system epss
scoring_elements 0.87846
published_at 2026-04-01T12:55:00Z
2
value 0.03669
scoring_system epss
scoring_elements 0.87933
published_at 2026-04-24T12:55:00Z
3
value 0.03669
scoring_system epss
scoring_elements 0.87939
published_at 2026-04-26T12:55:00Z
4
value 0.03669
scoring_system epss
scoring_elements 0.87856
published_at 2026-04-02T12:55:00Z
5
value 0.03669
scoring_system epss
scoring_elements 0.87869
published_at 2026-04-04T12:55:00Z
6
value 0.03669
scoring_system epss
scoring_elements 0.87872
published_at 2026-04-07T12:55:00Z
7
value 0.03669
scoring_system epss
scoring_elements 0.87894
published_at 2026-04-08T12:55:00Z
8
value 0.03669
scoring_system epss
scoring_elements 0.87901
published_at 2026-04-09T12:55:00Z
9
value 0.03669
scoring_system epss
scoring_elements 0.87912
published_at 2026-04-11T12:55:00Z
10
value 0.03669
scoring_system epss
scoring_elements 0.87905
published_at 2026-04-12T12:55:00Z
11
value 0.03669
scoring_system epss
scoring_elements 0.87903
published_at 2026-04-13T12:55:00Z
12
value 0.03669
scoring_system epss
scoring_elements 0.87917
published_at 2026-04-16T12:55:00Z
13
value 0.03669
scoring_system epss
scoring_elements 0.87916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3837
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=329385
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=329385
5
reference_url http://secunia.com/advisories/31984
reference_id
reference_type
scores
url http://secunia.com/advisories/31984
6
reference_url http://secunia.com/advisories/31985
reference_id
reference_type
scores
url http://secunia.com/advisories/31985
7
reference_url http://secunia.com/advisories/31987
reference_id
reference_type
scores
url http://secunia.com/advisories/31987
8
reference_url http://secunia.com/advisories/32010
reference_id
reference_type
scores
url http://secunia.com/advisories/32010
9
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
10
reference_url http://secunia.com/advisories/32012
reference_id
reference_type
scores
url http://secunia.com/advisories/32012
11
reference_url http://secunia.com/advisories/32042
reference_id
reference_type
scores
url http://secunia.com/advisories/32042
12
reference_url http://secunia.com/advisories/32044
reference_id
reference_type
scores
url http://secunia.com/advisories/32044
13
reference_url http://secunia.com/advisories/32089
reference_id
reference_type
scores
url http://secunia.com/advisories/32089
14
reference_url http://secunia.com/advisories/32095
reference_id
reference_type
scores
url http://secunia.com/advisories/32095
15
reference_url http://secunia.com/advisories/32096
reference_id
reference_type
scores
url http://secunia.com/advisories/32096
16
reference_url http://secunia.com/advisories/32144
reference_id
reference_type
scores
url http://secunia.com/advisories/32144
17
reference_url http://secunia.com/advisories/32185
reference_id
reference_type
scores
url http://secunia.com/advisories/32185
18
reference_url http://secunia.com/advisories/32196
reference_id
reference_type
scores
url http://secunia.com/advisories/32196
19
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
20
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
21
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45348
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45348
23
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
24
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9950
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9950
26
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
27
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
28
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
29
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
30
reference_url http://www.debian.org/security/2008/dsa-1649
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1649
31
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
32
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
33
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
34
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-40.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-40.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-0879.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0879.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2008-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0882.html
37
reference_url http://www.securityfocus.com/bid/31346
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31346
38
reference_url http://www.securitytracker.com/id?1020922
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020922
39
reference_url http://www.ubuntu.com/usn/usn-645-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-1
40
reference_url http://www.ubuntu.com/usn/usn-645-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-2
41
reference_url http://www.vupen.com/english/advisories/2008/2661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2661
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463189
reference_id 463189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463189
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837
reference_id CVE-2008-3837
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3837
reference_id CVE-2008-3837
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3837
53
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-40
reference_id mfsa2008-40
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-40
55
reference_url https://access.redhat.com/errata/RHSA-2008:0879
reference_id RHSA-2008:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0879
56
reference_url https://access.redhat.com/errata/RHSA-2008:0882
reference_id RHSA-2008:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0882
57
reference_url https://usn.ubuntu.com/645-1/
reference_id USN-645-1
reference_type
scores
url https://usn.ubuntu.com/645-1/
58
reference_url https://usn.ubuntu.com/645-2/
reference_id USN-645-2
reference_type
scores
url https://usn.ubuntu.com/645-2/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-3837
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2q2b-6j3y-e7gb
1
url VCID-6vwv-vgjn-w7h2
vulnerability_id VCID-6vwv-vgjn-w7h2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://download.novell.com/Download?buildid=WZXONb-tqBw~
reference_id
reference_type
scores
url http://download.novell.com/Download?buildid=WZXONb-tqBw~
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4061.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4061.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4061
reference_id
reference_type
scores
0
value 0.03898
scoring_system epss
scoring_elements 0.88313
published_at 2026-04-29T12:55:00Z
1
value 0.03898
scoring_system epss
scoring_elements 0.8822
published_at 2026-04-01T12:55:00Z
2
value 0.03898
scoring_system epss
scoring_elements 0.88305
published_at 2026-04-24T12:55:00Z
3
value 0.03898
scoring_system epss
scoring_elements 0.8831
published_at 2026-04-26T12:55:00Z
4
value 0.03898
scoring_system epss
scoring_elements 0.88228
published_at 2026-04-02T12:55:00Z
5
value 0.03898
scoring_system epss
scoring_elements 0.88243
published_at 2026-04-04T12:55:00Z
6
value 0.03898
scoring_system epss
scoring_elements 0.88248
published_at 2026-04-07T12:55:00Z
7
value 0.03898
scoring_system epss
scoring_elements 0.88267
published_at 2026-04-08T12:55:00Z
8
value 0.03898
scoring_system epss
scoring_elements 0.88273
published_at 2026-04-09T12:55:00Z
9
value 0.03898
scoring_system epss
scoring_elements 0.88285
published_at 2026-04-11T12:55:00Z
10
value 0.03898
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-12T12:55:00Z
11
value 0.03898
scoring_system epss
scoring_elements 0.88276
published_at 2026-04-13T12:55:00Z
12
value 0.03898
scoring_system epss
scoring_elements 0.8829
published_at 2026-04-16T12:55:00Z
13
value 0.03898
scoring_system epss
scoring_elements 0.88288
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4061
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=443089
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=443089
5
reference_url http://secunia.com/advisories/31984
reference_id
reference_type
scores
url http://secunia.com/advisories/31984
6
reference_url http://secunia.com/advisories/31985
reference_id
reference_type
scores
url http://secunia.com/advisories/31985
7
reference_url http://secunia.com/advisories/31987
reference_id
reference_type
scores
url http://secunia.com/advisories/31987
8
reference_url http://secunia.com/advisories/32007
reference_id
reference_type
scores
url http://secunia.com/advisories/32007
9
reference_url http://secunia.com/advisories/32010
reference_id
reference_type
scores
url http://secunia.com/advisories/32010
10
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
11
reference_url http://secunia.com/advisories/32012
reference_id
reference_type
scores
url http://secunia.com/advisories/32012
12
reference_url http://secunia.com/advisories/32025
reference_id
reference_type
scores
url http://secunia.com/advisories/32025
13
reference_url http://secunia.com/advisories/32042
reference_id
reference_type
scores
url http://secunia.com/advisories/32042
14
reference_url http://secunia.com/advisories/32044
reference_id
reference_type
scores
url http://secunia.com/advisories/32044
15
reference_url http://secunia.com/advisories/32082
reference_id
reference_type
scores
url http://secunia.com/advisories/32082
16
reference_url http://secunia.com/advisories/32089
reference_id
reference_type
scores
url http://secunia.com/advisories/32089
17
reference_url http://secunia.com/advisories/32092
reference_id
reference_type
scores
url http://secunia.com/advisories/32092
18
reference_url http://secunia.com/advisories/32095
reference_id
reference_type
scores
url http://secunia.com/advisories/32095
19
reference_url http://secunia.com/advisories/32096
reference_id
reference_type
scores
url http://secunia.com/advisories/32096
20
reference_url http://secunia.com/advisories/32144
reference_id
reference_type
scores
url http://secunia.com/advisories/32144
21
reference_url http://secunia.com/advisories/32185
reference_id
reference_type
scores
url http://secunia.com/advisories/32185
22
reference_url http://secunia.com/advisories/32196
reference_id
reference_type
scores
url http://secunia.com/advisories/32196
23
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
24
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
25
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
26
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
27
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45351
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45351
28
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
30
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10794
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10794
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
33
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
34
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
35
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
36
reference_url http://www.debian.org/security/2008/dsa-1649
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1649
37
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
38
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
39
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
42
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-42.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-42.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0879.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0879.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2008-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0882.html
45
reference_url http://www.redhat.com/support/errata/RHSA-2008-0908.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0908.html
46
reference_url http://www.securityfocus.com/bid/31346
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31346
47
reference_url http://www.securitytracker.com/id?1020916
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020916
48
reference_url http://www.ubuntu.com/usn/usn-645-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-1
49
reference_url http://www.ubuntu.com/usn/usn-645-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-2
50
reference_url http://www.ubuntu.com/usn/usn-647-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-647-1
51
reference_url http://www.vupen.com/english/advisories/2008/2661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2661
52
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
53
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463199
reference_id 463199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463199
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061
reference_id CVE-2008-4061
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4061
reference_id CVE-2008-4061
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4061
64
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
65
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-42
reference_id mfsa2008-42
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-42
66
reference_url https://access.redhat.com/errata/RHSA-2008:0879
reference_id RHSA-2008:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0879
67
reference_url https://access.redhat.com/errata/RHSA-2008:0882
reference_id RHSA-2008:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0882
68
reference_url https://access.redhat.com/errata/RHSA-2008:0908
reference_id RHSA-2008:0908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0908
69
reference_url https://usn.ubuntu.com/645-1/
reference_id USN-645-1
reference_type
scores
url https://usn.ubuntu.com/645-1/
70
reference_url https://usn.ubuntu.com/645-2/
reference_id USN-645-2
reference_type
scores
url https://usn.ubuntu.com/645-2/
71
reference_url https://usn.ubuntu.com/647-1/
reference_id USN-647-1
reference_type
scores
url https://usn.ubuntu.com/647-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-4061
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vwv-vgjn-w7h2
2
url VCID-at1m-d43c-ryeb
vulnerability_id VCID-at1m-d43c-ryeb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5014.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5014
reference_id
reference_type
scores
0
value 0.25205
scoring_system epss
scoring_elements 0.96206
published_at 2026-04-29T12:55:00Z
1
value 0.25205
scoring_system epss
scoring_elements 0.9615
published_at 2026-04-01T12:55:00Z
2
value 0.25205
scoring_system epss
scoring_elements 0.96203
published_at 2026-04-24T12:55:00Z
3
value 0.25205
scoring_system epss
scoring_elements 0.96205
published_at 2026-04-26T12:55:00Z
4
value 0.25205
scoring_system epss
scoring_elements 0.96158
published_at 2026-04-02T12:55:00Z
5
value 0.25205
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-04T12:55:00Z
6
value 0.25205
scoring_system epss
scoring_elements 0.96168
published_at 2026-04-07T12:55:00Z
7
value 0.25205
scoring_system epss
scoring_elements 0.96178
published_at 2026-04-08T12:55:00Z
8
value 0.25205
scoring_system epss
scoring_elements 0.96182
published_at 2026-04-09T12:55:00Z
9
value 0.25205
scoring_system epss
scoring_elements 0.96186
published_at 2026-04-11T12:55:00Z
10
value 0.25205
scoring_system epss
scoring_elements 0.96185
published_at 2026-04-12T12:55:00Z
11
value 0.25205
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-13T12:55:00Z
12
value 0.25205
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-16T12:55:00Z
13
value 0.25205
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5014
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=436741
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=436741
4
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
5
reference_url http://secunia.com/advisories/32684
reference_id
reference_type
scores
url http://secunia.com/advisories/32684
6
reference_url http://secunia.com/advisories/32693
reference_id
reference_type
scores
url http://secunia.com/advisories/32693
7
reference_url http://secunia.com/advisories/32694
reference_id
reference_type
scores
url http://secunia.com/advisories/32694
8
reference_url http://secunia.com/advisories/32695
reference_id
reference_type
scores
url http://secunia.com/advisories/32695
9
reference_url http://secunia.com/advisories/32714
reference_id
reference_type
scores
url http://secunia.com/advisories/32714
10
reference_url http://secunia.com/advisories/32715
reference_id
reference_type
scores
url http://secunia.com/advisories/32715
11
reference_url http://secunia.com/advisories/32721
reference_id
reference_type
scores
url http://secunia.com/advisories/32721
12
reference_url http://secunia.com/advisories/32778
reference_id
reference_type
scores
url http://secunia.com/advisories/32778
13
reference_url http://secunia.com/advisories/32798
reference_id
reference_type
scores
url http://secunia.com/advisories/32798
14
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
15
reference_url http://secunia.com/advisories/32853
reference_id
reference_type
scores
url http://secunia.com/advisories/32853
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
23
reference_url http://ubuntu.com/usn/usn-667-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-667-1
24
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
25
reference_url http://www.debian.org/security/2008/dsa-1671
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1671
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
31
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0976.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0976.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0977.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0977.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-0978.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0978.html
35
reference_url http://www.securityfocus.com/bid/32281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32281
36
reference_url http://www.securitytracker.com/id?1021182
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021182
37
reference_url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-319A.html
38
reference_url http://www.vupen.com/english/advisories/2008/3146
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3146
39
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470873
reference_id 470873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470873
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
reference_id CVE-2008-5014
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5014
reference_id CVE-2008-5014
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5014
51
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
52
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-50
reference_id mfsa2008-50
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-50
53
reference_url https://access.redhat.com/errata/RHSA-2008:0976
reference_id RHSA-2008:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0976
54
reference_url https://access.redhat.com/errata/RHSA-2008:0977
reference_id RHSA-2008:0977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0977
55
reference_url https://access.redhat.com/errata/RHSA-2008:0978
reference_id RHSA-2008:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0978
56
reference_url https://usn.ubuntu.com/667-1/
reference_id USN-667-1
reference_type
scores
url https://usn.ubuntu.com/667-1/
57
reference_url https://usn.ubuntu.com/668-1/
reference_id USN-668-1
reference_type
scores
url https://usn.ubuntu.com/668-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-5014
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-at1m-d43c-ryeb
3
url VCID-cyb6-39sq-hfg5
vulnerability_id VCID-cyb6-39sq-hfg5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://download.novell.com/Download?buildid=WZXONb-tqBw~
reference_id
reference_type
scores
url http://download.novell.com/Download?buildid=WZXONb-tqBw~
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4058.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4058.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4058
reference_id
reference_type
scores
0
value 0.0348
scoring_system epss
scoring_elements 0.87605
published_at 2026-04-29T12:55:00Z
1
value 0.0348
scoring_system epss
scoring_elements 0.87513
published_at 2026-04-01T12:55:00Z
2
value 0.0348
scoring_system epss
scoring_elements 0.876
published_at 2026-04-24T12:55:00Z
3
value 0.0348
scoring_system epss
scoring_elements 0.87607
published_at 2026-04-26T12:55:00Z
4
value 0.0348
scoring_system epss
scoring_elements 0.87523
published_at 2026-04-02T12:55:00Z
5
value 0.0348
scoring_system epss
scoring_elements 0.87537
published_at 2026-04-04T12:55:00Z
6
value 0.0348
scoring_system epss
scoring_elements 0.87539
published_at 2026-04-07T12:55:00Z
7
value 0.0348
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-08T12:55:00Z
8
value 0.0348
scoring_system epss
scoring_elements 0.87565
published_at 2026-04-09T12:55:00Z
9
value 0.0348
scoring_system epss
scoring_elements 0.87576
published_at 2026-04-11T12:55:00Z
10
value 0.0348
scoring_system epss
scoring_elements 0.87572
published_at 2026-04-12T12:55:00Z
11
value 0.0348
scoring_system epss
scoring_elements 0.87569
published_at 2026-04-13T12:55:00Z
12
value 0.0348
scoring_system epss
scoring_elements 0.87583
published_at 2026-04-16T12:55:00Z
13
value 0.0348
scoring_system epss
scoring_elements 0.87584
published_at 2026-04-18T12:55:00Z
14
value 0.0348
scoring_system epss
scoring_elements 0.87582
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4058
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=444075
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=444075
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=444077
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=444077
6
reference_url http://secunia.com/advisories/31984
reference_id
reference_type
scores
url http://secunia.com/advisories/31984
7
reference_url http://secunia.com/advisories/31985
reference_id
reference_type
scores
url http://secunia.com/advisories/31985
8
reference_url http://secunia.com/advisories/31987
reference_id
reference_type
scores
url http://secunia.com/advisories/31987
9
reference_url http://secunia.com/advisories/32007
reference_id
reference_type
scores
url http://secunia.com/advisories/32007
10
reference_url http://secunia.com/advisories/32010
reference_id
reference_type
scores
url http://secunia.com/advisories/32010
11
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
12
reference_url http://secunia.com/advisories/32012
reference_id
reference_type
scores
url http://secunia.com/advisories/32012
13
reference_url http://secunia.com/advisories/32025
reference_id
reference_type
scores
url http://secunia.com/advisories/32025
14
reference_url http://secunia.com/advisories/32042
reference_id
reference_type
scores
url http://secunia.com/advisories/32042
15
reference_url http://secunia.com/advisories/32044
reference_id
reference_type
scores
url http://secunia.com/advisories/32044
16
reference_url http://secunia.com/advisories/32082
reference_id
reference_type
scores
url http://secunia.com/advisories/32082
17
reference_url http://secunia.com/advisories/32089
reference_id
reference_type
scores
url http://secunia.com/advisories/32089
18
reference_url http://secunia.com/advisories/32092
reference_id
reference_type
scores
url http://secunia.com/advisories/32092
19
reference_url http://secunia.com/advisories/32095
reference_id
reference_type
scores
url http://secunia.com/advisories/32095
20
reference_url http://secunia.com/advisories/32096
reference_id
reference_type
scores
url http://secunia.com/advisories/32096
21
reference_url http://secunia.com/advisories/32144
reference_id
reference_type
scores
url http://secunia.com/advisories/32144
22
reference_url http://secunia.com/advisories/32185
reference_id
reference_type
scores
url http://secunia.com/advisories/32185
23
reference_url http://secunia.com/advisories/32196
reference_id
reference_type
scores
url http://secunia.com/advisories/32196
24
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
25
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
26
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
27
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
28
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45349
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45349
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
30
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
31
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9679
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9679
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
34
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
35
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
36
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
37
reference_url http://www.debian.org/security/2008/dsa-1649
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1649
38
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
39
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
40
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
42
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
43
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-41.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-41.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2008-0879.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0879.html
45
reference_url http://www.redhat.com/support/errata/RHSA-2008-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0882.html
46
reference_url http://www.redhat.com/support/errata/RHSA-2008-0908.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0908.html
47
reference_url http://www.securityfocus.com/bid/31346
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31346
48
reference_url http://www.securitytracker.com/id?1020915
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020915
49
reference_url http://www.ubuntu.com/usn/usn-645-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-1
50
reference_url http://www.ubuntu.com/usn/usn-645-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-2
51
reference_url http://www.ubuntu.com/usn/usn-647-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-647-1
52
reference_url http://www.vupen.com/english/advisories/2008/2661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2661
53
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463190
reference_id 463190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463190
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058
reference_id CVE-2008-4058
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4058
reference_id CVE-2008-4058
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4058
65
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
66
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-41
reference_id mfsa2008-41
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-41
67
reference_url https://access.redhat.com/errata/RHSA-2008:0879
reference_id RHSA-2008:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0879
68
reference_url https://access.redhat.com/errata/RHSA-2008:0882
reference_id RHSA-2008:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0882
69
reference_url https://access.redhat.com/errata/RHSA-2008:0908
reference_id RHSA-2008:0908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0908
70
reference_url https://usn.ubuntu.com/645-1/
reference_id USN-645-1
reference_type
scores
url https://usn.ubuntu.com/645-1/
71
reference_url https://usn.ubuntu.com/645-2/
reference_id USN-645-2
reference_type
scores
url https://usn.ubuntu.com/645-2/
72
reference_url https://usn.ubuntu.com/647-1/
reference_id USN-647-1
reference_type
scores
url https://usn.ubuntu.com/647-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-4058
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cyb6-39sq-hfg5
4
url VCID-hgv4-943g-1qe8
vulnerability_id VCID-hgv4-943g-1qe8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://download.novell.com/Download?buildid=WZXONb-tqBw~
reference_id
reference_type
scores
url http://download.novell.com/Download?buildid=WZXONb-tqBw~
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4065.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4065
reference_id
reference_type
scores
0
value 0.0134
scoring_system epss
scoring_elements 0.80087
published_at 2026-04-29T12:55:00Z
1
value 0.0134
scoring_system epss
scoring_elements 0.79958
published_at 2026-04-01T12:55:00Z
2
value 0.0134
scoring_system epss
scoring_elements 0.80066
published_at 2026-04-24T12:55:00Z
3
value 0.0134
scoring_system epss
scoring_elements 0.80071
published_at 2026-04-26T12:55:00Z
4
value 0.0134
scoring_system epss
scoring_elements 0.79966
published_at 2026-04-02T12:55:00Z
5
value 0.0134
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-04T12:55:00Z
6
value 0.0134
scoring_system epss
scoring_elements 0.79976
published_at 2026-04-07T12:55:00Z
7
value 0.0134
scoring_system epss
scoring_elements 0.80004
published_at 2026-04-08T12:55:00Z
8
value 0.0134
scoring_system epss
scoring_elements 0.80013
published_at 2026-04-09T12:55:00Z
9
value 0.0134
scoring_system epss
scoring_elements 0.80033
published_at 2026-04-11T12:55:00Z
10
value 0.0134
scoring_system epss
scoring_elements 0.80017
published_at 2026-04-12T12:55:00Z
11
value 0.0134
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-13T12:55:00Z
12
value 0.0134
scoring_system epss
scoring_elements 0.80037
published_at 2026-04-18T12:55:00Z
13
value 0.0134
scoring_system epss
scoring_elements 0.80038
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4065
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=430740
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=430740
5
reference_url http://secunia.com/advisories/31984
reference_id
reference_type
scores
url http://secunia.com/advisories/31984
6
reference_url http://secunia.com/advisories/31985
reference_id
reference_type
scores
url http://secunia.com/advisories/31985
7
reference_url http://secunia.com/advisories/31987
reference_id
reference_type
scores
url http://secunia.com/advisories/31987
8
reference_url http://secunia.com/advisories/32007
reference_id
reference_type
scores
url http://secunia.com/advisories/32007
9
reference_url http://secunia.com/advisories/32010
reference_id
reference_type
scores
url http://secunia.com/advisories/32010
10
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
11
reference_url http://secunia.com/advisories/32012
reference_id
reference_type
scores
url http://secunia.com/advisories/32012
12
reference_url http://secunia.com/advisories/32025
reference_id
reference_type
scores
url http://secunia.com/advisories/32025
13
reference_url http://secunia.com/advisories/32042
reference_id
reference_type
scores
url http://secunia.com/advisories/32042
14
reference_url http://secunia.com/advisories/32044
reference_id
reference_type
scores
url http://secunia.com/advisories/32044
15
reference_url http://secunia.com/advisories/32082
reference_id
reference_type
scores
url http://secunia.com/advisories/32082
16
reference_url http://secunia.com/advisories/32089
reference_id
reference_type
scores
url http://secunia.com/advisories/32089
17
reference_url http://secunia.com/advisories/32092
reference_id
reference_type
scores
url http://secunia.com/advisories/32092
18
reference_url http://secunia.com/advisories/32095
reference_id
reference_type
scores
url http://secunia.com/advisories/32095
19
reference_url http://secunia.com/advisories/32096
reference_id
reference_type
scores
url http://secunia.com/advisories/32096
20
reference_url http://secunia.com/advisories/32144
reference_id
reference_type
scores
url http://secunia.com/advisories/32144
21
reference_url http://secunia.com/advisories/32185
reference_id
reference_type
scores
url http://secunia.com/advisories/32185
22
reference_url http://secunia.com/advisories/32196
reference_id
reference_type
scores
url http://secunia.com/advisories/32196
23
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
24
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
25
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
26
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
27
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45356
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45356
28
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
30
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11383
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11383
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
33
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
34
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
35
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
36
reference_url http://www.debian.org/security/2008/dsa-1649
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1649
37
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
38
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
39
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
42
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-43.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-43.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0879.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0879.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2008-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0882.html
45
reference_url http://www.redhat.com/support/errata/RHSA-2008-0908.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0908.html
46
reference_url http://www.securityfocus.com/bid/31346
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31346
47
reference_url http://www.securitytracker.com/id?1020920
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020920
48
reference_url http://www.ubuntu.com/usn/usn-645-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-1
49
reference_url http://www.ubuntu.com/usn/usn-645-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-2
50
reference_url http://www.ubuntu.com/usn/usn-647-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-647-1
51
reference_url http://www.vupen.com/english/advisories/2008/2661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2661
52
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
53
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463234
reference_id 463234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463234
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065
reference_id CVE-2008-4065
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4065
reference_id CVE-2008-4065
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4065
64
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
65
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-43
reference_id mfsa2008-43
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-43
66
reference_url https://access.redhat.com/errata/RHSA-2008:0879
reference_id RHSA-2008:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0879
67
reference_url https://access.redhat.com/errata/RHSA-2008:0882
reference_id RHSA-2008:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0882
68
reference_url https://access.redhat.com/errata/RHSA-2008:0908
reference_id RHSA-2008:0908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0908
69
reference_url https://usn.ubuntu.com/645-1/
reference_id USN-645-1
reference_type
scores
url https://usn.ubuntu.com/645-1/
70
reference_url https://usn.ubuntu.com/645-2/
reference_id USN-645-2
reference_type
scores
url https://usn.ubuntu.com/645-2/
71
reference_url https://usn.ubuntu.com/647-1/
reference_id USN-647-1
reference_type
scores
url https://usn.ubuntu.com/647-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-4065
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgv4-943g-1qe8
5
url VCID-tvnv-cryn-x7fp
vulnerability_id VCID-tvnv-cryn-x7fp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://download.novell.com/Download?buildid=WZXONb-tqBw~
reference_id
reference_type
scores
url http://download.novell.com/Download?buildid=WZXONb-tqBw~
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4067.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4067
reference_id
reference_type
scores
0
value 0.02059
scoring_system epss
scoring_elements 0.83971
published_at 2026-04-29T12:55:00Z
1
value 0.02059
scoring_system epss
scoring_elements 0.83838
published_at 2026-04-01T12:55:00Z
2
value 0.02059
scoring_system epss
scoring_elements 0.83958
published_at 2026-04-24T12:55:00Z
3
value 0.02059
scoring_system epss
scoring_elements 0.83966
published_at 2026-04-26T12:55:00Z
4
value 0.02059
scoring_system epss
scoring_elements 0.83852
published_at 2026-04-02T12:55:00Z
5
value 0.02059
scoring_system epss
scoring_elements 0.83867
published_at 2026-04-04T12:55:00Z
6
value 0.02059
scoring_system epss
scoring_elements 0.83869
published_at 2026-04-07T12:55:00Z
7
value 0.02059
scoring_system epss
scoring_elements 0.83893
published_at 2026-04-08T12:55:00Z
8
value 0.02059
scoring_system epss
scoring_elements 0.83899
published_at 2026-04-09T12:55:00Z
9
value 0.02059
scoring_system epss
scoring_elements 0.83915
published_at 2026-04-11T12:55:00Z
10
value 0.02059
scoring_system epss
scoring_elements 0.8391
published_at 2026-04-12T12:55:00Z
11
value 0.02059
scoring_system epss
scoring_elements 0.83906
published_at 2026-04-13T12:55:00Z
12
value 0.02059
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-18T12:55:00Z
13
value 0.02059
scoring_system epss
scoring_elements 0.83933
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4067
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=380994
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=380994
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=394075
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=394075
6
reference_url http://secunia.com/advisories/31984
reference_id
reference_type
scores
url http://secunia.com/advisories/31984
7
reference_url http://secunia.com/advisories/31985
reference_id
reference_type
scores
url http://secunia.com/advisories/31985
8
reference_url http://secunia.com/advisories/31987
reference_id
reference_type
scores
url http://secunia.com/advisories/31987
9
reference_url http://secunia.com/advisories/32007
reference_id
reference_type
scores
url http://secunia.com/advisories/32007
10
reference_url http://secunia.com/advisories/32010
reference_id
reference_type
scores
url http://secunia.com/advisories/32010
11
reference_url http://secunia.com/advisories/32011
reference_id
reference_type
scores
url http://secunia.com/advisories/32011
12
reference_url http://secunia.com/advisories/32012
reference_id
reference_type
scores
url http://secunia.com/advisories/32012
13
reference_url http://secunia.com/advisories/32025
reference_id
reference_type
scores
url http://secunia.com/advisories/32025
14
reference_url http://secunia.com/advisories/32042
reference_id
reference_type
scores
url http://secunia.com/advisories/32042
15
reference_url http://secunia.com/advisories/32044
reference_id
reference_type
scores
url http://secunia.com/advisories/32044
16
reference_url http://secunia.com/advisories/32082
reference_id
reference_type
scores
url http://secunia.com/advisories/32082
17
reference_url http://secunia.com/advisories/32089
reference_id
reference_type
scores
url http://secunia.com/advisories/32089
18
reference_url http://secunia.com/advisories/32092
reference_id
reference_type
scores
url http://secunia.com/advisories/32092
19
reference_url http://secunia.com/advisories/32095
reference_id
reference_type
scores
url http://secunia.com/advisories/32095
20
reference_url http://secunia.com/advisories/32096
reference_id
reference_type
scores
url http://secunia.com/advisories/32096
21
reference_url http://secunia.com/advisories/32144
reference_id
reference_type
scores
url http://secunia.com/advisories/32144
22
reference_url http://secunia.com/advisories/32185
reference_id
reference_type
scores
url http://secunia.com/advisories/32185
23
reference_url http://secunia.com/advisories/32196
reference_id
reference_type
scores
url http://secunia.com/advisories/32196
24
reference_url http://secunia.com/advisories/32845
reference_id
reference_type
scores
url http://secunia.com/advisories/32845
25
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
26
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
27
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
28
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45359
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45359
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
30
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
31
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10770
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10770
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
34
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
35
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
36
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
37
reference_url http://www.0x000000.com/?i=422
reference_id
reference_type
scores
url http://www.0x000000.com/?i=422
38
reference_url http://www.debian.org/security/2008/dsa-1649
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1649
39
reference_url http://www.debian.org/security/2008/dsa-1669
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1669
40
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
41
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
42
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
43
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
44
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-44.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-44.html
45
reference_url http://www.redhat.com/support/errata/RHSA-2008-0879.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0879.html
46
reference_url http://www.redhat.com/support/errata/RHSA-2008-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0882.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2008-0908.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0908.html
48
reference_url http://www.securityfocus.com/bid/31346
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31346
49
reference_url http://www.securitytracker.com/id?1020921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020921
50
reference_url http://www.ubuntu.com/usn/usn-645-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-1
51
reference_url http://www.ubuntu.com/usn/usn-645-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-645-2
52
reference_url http://www.ubuntu.com/usn/usn-647-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-647-1
53
reference_url http://www.vupen.com/english/advisories/2008/2661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2661
54
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463246
reference_id 463246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463246
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067
reference_id CVE-2008-4067
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4067
reference_id CVE-2008-4067
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4067
67
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
68
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-44
reference_id mfsa2008-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-44
69
reference_url https://access.redhat.com/errata/RHSA-2008:0879
reference_id RHSA-2008:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0879
70
reference_url https://access.redhat.com/errata/RHSA-2008:0882
reference_id RHSA-2008:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0882
71
reference_url https://access.redhat.com/errata/RHSA-2008:0908
reference_id RHSA-2008:0908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0908
72
reference_url https://usn.ubuntu.com/645-1/
reference_id USN-645-1
reference_type
scores
url https://usn.ubuntu.com/645-1/
73
reference_url https://usn.ubuntu.com/645-2/
reference_id USN-645-2
reference_type
scores
url https://usn.ubuntu.com/645-2/
74
reference_url https://usn.ubuntu.com/647-1/
reference_id USN-647-1
reference_type
scores
url https://usn.ubuntu.com/647-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.2
purl pkg:mozilla/Firefox@3.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2
aliases CVE-2008-4067
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvnv-cryn-x7fp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.2