{"url":"http://public2.vulnerablecode.io/api/packages/129413?format=json","purl":"pkg:rpm/redhat/seamonkey@1.0.9-0.9?arch=el2","type":"rpm","namespace":"redhat","name":"seamonkey","version":"1.0.9-0.9","qualifiers":{"arch":"el2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48627?format=json","vulnerability_id":"VCID-3tuj-c9xa-e3aj","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0416","reference_id":"","reference_type":"","scores":[{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92501","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92502","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09262","scoring_system":"epss","scoring_elements":"0.92747","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0416"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431740","reference_id":"431740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416","reference_id":"CVE-2008-0416","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-13","reference_id":"mfsa2008-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0416"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tuj-c9xa-e3aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48634?format=json","vulnerability_id":"VCID-8r7s-6f5v-67f7","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0420","reference_id":"","reference_type":"","scores":[{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86188","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8621","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0420"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431750","reference_id":"431750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420","reference_id":"CVE-2008-0420","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-07","reference_id":"mfsa2008-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0420"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7s-6f5v-67f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48635?format=json","vulnerability_id":"VCID-9y9r-1gqw-6fgk","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0591","reference_id":"","reference_type":"","scores":[{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0591"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431751","reference_id":"431751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591","reference_id":"CVE-2008-0591","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-08","reference_id":"mfsa2008-08","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0591"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y9r-1gqw-6fgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48626?format=json","vulnerability_id":"VCID-ea68-57qy-1kax","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0415","reference_id":"","reference_type":"","scores":[{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.8366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83728","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431739","reference_id":"431739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415","reference_id":"CVE-2008-0415","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-03","reference_id":"mfsa2008-03","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0415"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ea68-57qy-1kax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48613?format=json","vulnerability_id":"VCID-fzxh-1prr-c7et","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0304","reference_id":"","reference_type":"","scores":[{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.9672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96722","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0304"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=435123","reference_id":"435123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=435123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304","reference_id":"CVE-2008-0304","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-12","reference_id":"mfsa2008-12","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0304"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzxh-1prr-c7et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48633?format=json","vulnerability_id":"VCID-h91r-2kyx-v7f8","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0419","reference_id":"","reference_type":"","scores":[{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95294","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0419"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431749","reference_id":"431749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419","reference_id":"CVE-2008-0419","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-06","reference_id":"mfsa2008-06","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0419"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h91r-2kyx-v7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48628?format=json","vulnerability_id":"VCID-mzfs-kyvw-qqe4","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0417","reference_id":"","reference_type":"","scores":[{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84043","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84162","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84169","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431742","reference_id":"431742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417","reference_id":"CVE-2008-0417","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-04","reference_id":"mfsa2008-04","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0417"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mzfs-kyvw-qqe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48631?format=json","vulnerability_id":"VCID-pkeq-w64f-5bda","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0418","reference_id":"","reference_type":"","scores":[{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97263","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431748","reference_id":"431748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418","reference_id":"CVE-2008-0418","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt","reference_id":"CVE-2008-0418;OSVDB-41187","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt"},{"reference_url":"https://www.securityfocus.com/bid/27406/info","reference_id":"CVE-2008-0418;OSVDB-41187","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/27406/info"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-05","reference_id":"mfsa2008-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0418"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pkeq-w64f-5bda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48621?format=json","vulnerability_id":"VCID-pr7b-3h2r-aubm","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0413","reference_id":"","reference_type":"","scores":[{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92094","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.9213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0413"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431733","reference_id":"431733","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413","reference_id":"CVE-2008-0413","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01","reference_id":"mfsa2008-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0413"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pr7b-3h2r-aubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48639?format=json","vulnerability_id":"VCID-vrc7-3rm4-b3fk","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0593","reference_id":"","reference_type":"","scores":[{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78037","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77973","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78023","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0593"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431756","reference_id":"431756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593","reference_id":"CVE-2008-0593","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-10","reference_id":"mfsa2008-10","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0593"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrc7-3rm4-b3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48615?format=json","vulnerability_id":"VCID-vvtb-nt5x-3yh9","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0412","reference_id":"","reference_type":"","scores":[{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93605","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93614","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93651","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93665","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431732","reference_id":"431732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412","reference_id":"CVE-2008-0412","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01","reference_id":"mfsa2008-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0412"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vvtb-nt5x-3yh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48638?format=json","vulnerability_id":"VCID-xv3s-67bq-1ugj","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0592","reference_id":"","reference_type":"","scores":[{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.8742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0592"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431752","reference_id":"431752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592","reference_id":"CVE-2008-0592","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-09","reference_id":"mfsa2008-09","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[],"aliases":["CVE-2008-0592"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xv3s-67bq-1ugj"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.9%3Farch=el2"}