{"url":"http://public2.vulnerablecode.io/api/packages/128738?format=json","purl":"pkg:rpm/redhat/nspr@4.7.3-1?arch=el4","type":"rpm","namespace":"redhat","name":"nspr","version":"4.7.3-1","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52283?format=json","vulnerability_id":"VCID-73rh-nbyu-8qeg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5510","reference_id":"","reference_type":"","scores":[{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77233","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.7726","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5510"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=228856","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=228856"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47415","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47415"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9662"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-67.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-67.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021425","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021425"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476283","reference_id":"476283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476283"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510","reference_id":"CVE-2008-5510","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5510","reference_id":"CVE-2008-5510","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5510"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-67","reference_id":"mfsa2008-67","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-67"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/717-3/","reference_id":"USN-717-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/717-3/"}],"fixed_packages":[],"aliases":["CVE-2008-5510"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73rh-nbyu-8qeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52244?format=json","vulnerability_id":"VCID-cza7-cbdd-h7f5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5505.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5505","reference_id":"","reference_type":"","scores":[{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74668","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00833","scoring_system":"epss","scoring_elements":"0.74657","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5505"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=295994","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=295994"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47411","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47411"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10443","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10443"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-63.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-63.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021428"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476274","reference_id":"476274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476274"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505","reference_id":"CVE-2008-5505","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5505","reference_id":"CVE-2008-5505","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5505"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-63","reference_id":"mfsa2008-63","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-63"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5505"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cza7-cbdd-h7f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52253?format=json","vulnerability_id":"VCID-eh6u-wqar-ubb7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5506","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66911","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66938","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5506"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458248","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458248"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47412","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47412"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-64.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-64.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021427","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021427"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476278","reference_id":"476278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476278"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506","reference_id":"CVE-2008-5506","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5506","reference_id":"CVE-2008-5506","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5506"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-64","reference_id":"mfsa2008-64","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5506"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh6u-wqar-ubb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52307?format=json","vulnerability_id":"VCID-f5tf-hr4a-tqad","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5512","reference_id":"","reference_type":"","scores":[{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8939","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89378","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89374","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5512"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47416","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47416"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021418","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021418"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476287","reference_id":"476287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476287"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512","reference_id":"CVE-2008-5512","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5512","reference_id":"CVE-2008-5512","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5512"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68","reference_id":"mfsa2008-68","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5512"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f5tf-hr4a-tqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52218?format=json","vulnerability_id":"VCID-g351-11xn-quhs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5501","reference_id":"","reference_type":"","scores":[{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.8921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5501"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=395623","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=395623"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47407","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47407"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476267","reference_id":"476267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476267"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501","reference_id":"CVE-2008-5501","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5501","reference_id":"CVE-2008-5501","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5501"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5501"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g351-11xn-quhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52315?format=json","vulnerability_id":"VCID-hmsz-pbfg-ube6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5513","reference_id":"","reference_type":"","scores":[{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77949","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77997","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78057","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5513"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47418","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47418"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-69.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-69.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021421","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021421"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476289","reference_id":"476289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513","reference_id":"CVE-2008-5513","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5513","reference_id":"CVE-2008-5513","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5513"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-69","reference_id":"mfsa2008-69","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-69"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5513"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmsz-pbfg-ube6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52204?format=json","vulnerability_id":"VCID-p598-baeh-dkd7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5500","reference_id":"","reference_type":"","scores":[{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90875","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.9081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.9085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90864","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464998","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464998"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47406","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47406"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476266","reference_id":"476266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476266"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500","reference_id":"CVE-2008-5500","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5500","reference_id":"CVE-2008-5500","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5500"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5500"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p598-baeh-dkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52259?format=json","vulnerability_id":"VCID-q376-zeq4-m3ah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5507","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43938","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4413","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44068","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44019","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5507"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=461735","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=461735"},{"reference_url":"http://scary.beasts.org/security/CESA-2008-011.html","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2008-011.html"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47413","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47413"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-65.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/archive/1/499353/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/499353/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021423","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021423"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476280","reference_id":"476280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476280"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507","reference_id":"CVE-2008-5507","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5507","reference_id":"CVE-2008-5507","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5507"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-65","reference_id":"mfsa2008-65","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-65"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5507"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q376-zeq4-m3ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52296?format=json","vulnerability_id":"VCID-r79k-3rkt-6fa8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5511","reference_id":"","reference_type":"","scores":[{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77246","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5511"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47417","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47417"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021418","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021418"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476285","reference_id":"476285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476285"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511","reference_id":"CVE-2008-5511","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5511","reference_id":"CVE-2008-5511","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5511"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68","reference_id":"mfsa2008-68","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5511"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r79k-3rkt-6fa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52275?format=json","vulnerability_id":"VCID-rjzx-gx6e-23ff","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5508","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84378","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84408","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5508"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=425046","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=425046"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47414","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47414"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-66.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-66.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021426"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476281","reference_id":"476281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476281"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508","reference_id":"CVE-2008-5508","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5508","reference_id":"CVE-2008-5508","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5508"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-66","reference_id":"mfsa2008-66","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5508"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjzx-gx6e-23ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52225?format=json","vulnerability_id":"VCID-rswk-w1h3-zbc9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5502","reference_id":"","reference_type":"","scores":[{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.8809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.87987","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.87996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.8801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88035","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88056","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88074","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5502"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458679","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458679"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47408","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47408"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476269","reference_id":"476269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476269"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502","reference_id":"CVE-2008-5502","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5502","reference_id":"CVE-2008-5502","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5502"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5502"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rswk-w1h3-zbc9"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nspr@4.7.3-1%3Farch=el4"}