{"url":"http://public2.vulnerablecode.io/api/packages/128745?format=json","purl":"pkg:rpm/redhat/thunderbird@2.0.0.19-1?arch=el5_2","type":"rpm","namespace":"redhat","name":"thunderbird","version":"2.0.0.19-1","qualifiers":{"arch":"el5_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52253?format=json","vulnerability_id":"VCID-eh6u-wqar-ubb7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5506","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.67002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66911","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6695","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5506"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458248","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458248"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47412","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47412"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-64.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-64.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021427","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021427"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476278","reference_id":"476278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476278"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506","reference_id":"CVE-2008-5506","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5506","reference_id":"CVE-2008-5506","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5506"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-64","reference_id":"mfsa2008-64","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-64"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5506"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh6u-wqar-ubb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52307?format=json","vulnerability_id":"VCID-f5tf-hr4a-tqad","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5512","reference_id":"","reference_type":"","scores":[{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89421","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8939","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.8936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89378","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04686","scoring_system":"epss","scoring_elements":"0.89381","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5512"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47416","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47416"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021418","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021418"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476287","reference_id":"476287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476287"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512","reference_id":"CVE-2008-5512","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5512","reference_id":"CVE-2008-5512","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5512"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68","reference_id":"mfsa2008-68","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5512"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f5tf-hr4a-tqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52218?format=json","vulnerability_id":"VCID-g351-11xn-quhs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5501","reference_id":"","reference_type":"","scores":[{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.8925","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.8921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04539","scoring_system":"epss","scoring_elements":"0.89214","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5501"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=395623","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=395623"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47407","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47407"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476267","reference_id":"476267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476267"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501","reference_id":"CVE-2008-5501","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5501","reference_id":"CVE-2008-5501","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5501"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5501"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g351-11xn-quhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52315?format=json","vulnerability_id":"VCID-hmsz-pbfg-ube6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5513","reference_id":"","reference_type":"","scores":[{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78131","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77949","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.77997","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78031","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78057","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01096","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5513"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47418","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47418"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-69.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-69.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021421","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021421"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476289","reference_id":"476289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513","reference_id":"CVE-2008-5513","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5513","reference_id":"CVE-2008-5513","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5513"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-69","reference_id":"mfsa2008-69","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-69"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5513"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmsz-pbfg-ube6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52204?format=json","vulnerability_id":"VCID-p598-baeh-dkd7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5500","reference_id":"","reference_type":"","scores":[{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90905","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90875","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90893","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.9081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.9085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90864","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06165","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464998","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464998"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47406","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47406"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476266","reference_id":"476266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476266"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500","reference_id":"CVE-2008-5500","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5500","reference_id":"CVE-2008-5500","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5500"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5500"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p598-baeh-dkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52259?format=json","vulnerability_id":"VCID-q376-zeq4-m3ah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5507","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43907","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43889","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4413","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44068","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43938","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5507"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=461735","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=461735"},{"reference_url":"http://scary.beasts.org/security/CESA-2008-011.html","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2008-011.html"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47413","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47413"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-65.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-65.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/archive/1/499353/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/499353/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021423","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021423"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476280","reference_id":"476280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476280"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507","reference_id":"CVE-2008-5507","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5507","reference_id":"CVE-2008-5507","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5507"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-65","reference_id":"mfsa2008-65","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-65"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5507"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q376-zeq4-m3ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52296?format=json","vulnerability_id":"VCID-r79k-3rkt-6fa8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5511","reference_id":"","reference_type":"","scores":[{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77323","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5511"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=451680"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=464174"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47417","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47417"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-68.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021418","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021418"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476285","reference_id":"476285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476285"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511","reference_id":"CVE-2008-5511","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5511","reference_id":"CVE-2008-5511","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5511"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68","reference_id":"mfsa2008-68","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5511"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r79k-3rkt-6fa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52275?format=json","vulnerability_id":"VCID-rjzx-gx6e-23ff","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5508","reference_id":"","reference_type":"","scores":[{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84468","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.8436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84378","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02182","scoring_system":"epss","scoring_elements":"0.84422","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5508"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=425046","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=425046"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=460803"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47414","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47414"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-66.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-66.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021426","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021426"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476281","reference_id":"476281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476281"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508","reference_id":"CVE-2008-5508","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5508","reference_id":"CVE-2008-5508","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5508"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-66","reference_id":"mfsa2008-66","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5508"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjzx-gx6e-23ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52225?format=json","vulnerability_id":"VCID-rswk-w1h3-zbc9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5502","reference_id":"","reference_type":"","scores":[{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88119","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.87987","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.8809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.87996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.8801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88035","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88056","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03767","scoring_system":"epss","scoring_elements":"0.88078","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5502"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458679","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=458679"},{"reference_url":"http://secunia.com/advisories/33188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33188"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33203"},{"reference_url":"http://secunia.com/advisories/33216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33216"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47408","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47408"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:245"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-60.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1036.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021417"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476269","reference_id":"476269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476269"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502","reference_id":"CVE-2008-5502","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5502","reference_id":"CVE-2008-5502","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5502"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60","reference_id":"mfsa2008-60","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-60"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1036","reference_id":"RHSA-2008:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-1/","reference_id":"USN-690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5502"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rswk-w1h3-zbc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52226?format=json","vulnerability_id":"VCID-wjmb-tuta-2qc4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5503","reference_id":"","reference_type":"","scores":[{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79321","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79139","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.7919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.79254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01234","scoring_system":"epss","scoring_elements":"0.7927","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5503"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=379959","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=379959"},{"reference_url":"http://secunia.com/advisories/33184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33184"},{"reference_url":"http://secunia.com/advisories/33189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33189"},{"reference_url":"http://secunia.com/advisories/33204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33204"},{"reference_url":"http://secunia.com/advisories/33205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33205"},{"reference_url":"http://secunia.com/advisories/33231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33231"},{"reference_url":"http://secunia.com/advisories/33232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33232"},{"reference_url":"http://secunia.com/advisories/33408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33408"},{"reference_url":"http://secunia.com/advisories/33415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33415"},{"reference_url":"http://secunia.com/advisories/33421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33421"},{"reference_url":"http://secunia.com/advisories/33433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33433"},{"reference_url":"http://secunia.com/advisories/33434","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33434"},{"reference_url":"http://secunia.com/advisories/33523","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33523"},{"reference_url":"http://secunia.com/advisories/33547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33547"},{"reference_url":"http://secunia.com/advisories/34501","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34501"},{"reference_url":"http://secunia.com/advisories/35080","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35080"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47409","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47409"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1"},{"reference_url":"http://www.debian.org/security/2009/dsa-1696","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1696"},{"reference_url":"http://www.debian.org/security/2009/dsa-1697","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1697"},{"reference_url":"http://www.debian.org/security/2009/dsa-1704","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1704"},{"reference_url":"http://www.debian.org/security/2009/dsa-1707","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1707"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:244"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:012"},{"reference_url":"http://www.mozilla.org/security/announce/2008/mfsa2008-61.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2008/mfsa2008-61.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-1037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0002.html"},{"reference_url":"http://www.securityfocus.com/bid/32882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32882"},{"reference_url":"http://www.securitytracker.com/id?1021424","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021424"},{"reference_url":"http://www.ubuntu.com/usn/usn-690-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-690-2"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-701-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-701-2"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0977","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0977"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476272","reference_id":"476272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476272"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503","reference_id":"CVE-2008-5503","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5503","reference_id":"CVE-2008-5503","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5503"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-61","reference_id":"mfsa2008-61","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1037","reference_id":"RHSA-2008:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0002","reference_id":"RHSA-2009:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0002"},{"reference_url":"https://usn.ubuntu.com/690-2/","reference_id":"USN-690-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-2/"},{"reference_url":"https://usn.ubuntu.com/690-3/","reference_id":"USN-690-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/690-3/"},{"reference_url":"https://usn.ubuntu.com/701-1/","reference_id":"USN-701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-1/"},{"reference_url":"https://usn.ubuntu.com/701-2/","reference_id":"USN-701-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/701-2/"}],"fixed_packages":[],"aliases":["CVE-2008-5503"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjmb-tuta-2qc4"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@2.0.0.19-1%3Farch=el5_2"}