{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","type":"ebuild","namespace":"net-libs","name":"xulrunner","version":"2.0.0.14","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.0.0.16","latest_non_vulnerable_version":"10.0.11","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48627?format=json","vulnerability_id":"VCID-3tuj-c9xa-e3aj","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0416","reference_id":"","reference_type":"","scores":[{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92501","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92502","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08734","scoring_system":"epss","scoring_elements":"0.92517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09262","scoring_system":"epss","scoring_elements":"0.92747","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0416"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431740","reference_id":"431740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416","reference_id":"CVE-2008-0416","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-13","reference_id":"mfsa2008-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0416"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tuj-c9xa-e3aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48647?format=json","vulnerability_id":"VCID-3x1b-2g3n-sybh","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1240","reference_id":"","reference_type":"","scores":[{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.8957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04851","scoring_system":"epss","scoring_elements":"0.89566","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240","reference_id":"CVE-2008-1240","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-18","reference_id":"mfsa2008-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-18"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1240"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3x1b-2g3n-sybh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48644?format=json","vulnerability_id":"VCID-44pm-j3ma-9qgx","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1236.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1236","reference_id":"","reference_type":"","scores":[{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96256","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.9627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.9629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96818","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1236"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438718","reference_id":"438718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236","reference_id":"CVE-2008-1236","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-15","reference_id":"mfsa2008-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"},{"reference_url":"https://usn.ubuntu.com/605-1/","reference_id":"USN-605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/605-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1236"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44pm-j3ma-9qgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48646?format=json","vulnerability_id":"VCID-474s-ddrw-4fgr","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1238.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1238","reference_id":"","reference_type":"","scores":[{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90118","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90162","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05425","scoring_system":"epss","scoring_elements":"0.90179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07189","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07189","scoring_system":"epss","scoring_elements":"0.91615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07189","scoring_system":"epss","scoring_elements":"0.91614","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1238"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438724","reference_id":"438724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238","reference_id":"CVE-2008-1238","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-16","reference_id":"mfsa2008-16","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1238"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-474s-ddrw-4fgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48612?format=json","vulnerability_id":"VCID-4ejp-1e65-h3at","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4879","reference_id":"","reference_type":"","scores":[{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.8132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81319","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879","reference_id":"CVE-2007-4879","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-17","reference_id":"mfsa2008-17","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-17"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2007-4879"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ejp-1e65-h3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48643?format=json","vulnerability_id":"VCID-74k3-cpxf-f3ag","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1235.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1235","reference_id":"","reference_type":"","scores":[{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.9533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.9534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95355","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19121","scoring_system":"epss","scoring_elements":"0.95359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23963","scoring_system":"epss","scoring_elements":"0.96047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23963","scoring_system":"epss","scoring_elements":"0.96046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23963","scoring_system":"epss","scoring_elements":"0.96048","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1235"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438717","reference_id":"438717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235","reference_id":"CVE-2008-1235","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14","reference_id":"mfsa2008-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"},{"reference_url":"https://usn.ubuntu.com/605-1/","reference_id":"USN-605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/605-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1235"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-74k3-cpxf-f3ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48625?format=json","vulnerability_id":"VCID-8h4q-2ubw-vudu","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0414","reference_id":"","reference_type":"","scores":[{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83203","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83276","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83272","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01906","scoring_system":"epss","scoring_elements":"0.83341","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0414"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432040","reference_id":"432040","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414","reference_id":"CVE-2008-0414","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-02","reference_id":"mfsa2008-02","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0414"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4q-2ubw-vudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48634?format=json","vulnerability_id":"VCID-8r7s-6f5v-67f7","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0420","reference_id":"","reference_type":"","scores":[{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.86188","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02828","scoring_system":"epss","scoring_elements":"0.8621","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0420"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431750","reference_id":"431750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420","reference_id":"CVE-2008-0420","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-07","reference_id":"mfsa2008-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0420"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7s-6f5v-67f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42900?format=json","vulnerability_id":"VCID-92uw-ru6r-7bcz","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1380.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1380","reference_id":"","reference_type":"","scores":[{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94997","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94949","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.9496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.9497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94979","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17011","scoring_system":"epss","scoring_elements":"0.94998","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1380"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440518","reference_id":"440518","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380","reference_id":"CVE-2008-1380","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://security.gentoo.org/glsa/200808-03","reference_id":"GLSA-200808-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200808-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-20","reference_id":"mfsa2008-20","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0222","reference_id":"RHSA-2008:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0223","reference_id":"RHSA-2008:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0224","reference_id":"RHSA-2008:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0224"},{"reference_url":"https://usn.ubuntu.com/602-1/","reference_id":"USN-602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/602-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/76175?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/76176?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.16"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"},{"url":"http://public2.vulnerablecode.io/api/packages/76177?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.16"}],"aliases":["CVE-2008-1380"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-92uw-ru6r-7bcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48635?format=json","vulnerability_id":"VCID-9y9r-1gqw-6fgk","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0591","reference_id":"","reference_type":"","scores":[{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07342","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0591"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431751","reference_id":"431751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591","reference_id":"CVE-2008-0591","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-08","reference_id":"mfsa2008-08","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0591"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y9r-1gqw-6fgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48626?format=json","vulnerability_id":"VCID-ea68-57qy-1kax","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0415","reference_id":"","reference_type":"","scores":[{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.8366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02001","scoring_system":"epss","scoring_elements":"0.83728","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431739","reference_id":"431739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415","reference_id":"CVE-2008-0415","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-03","reference_id":"mfsa2008-03","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0415"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ea68-57qy-1kax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48613?format=json","vulnerability_id":"VCID-fzxh-1prr-c7et","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0304","reference_id":"","reference_type":"","scores":[{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.9672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30512","scoring_system":"epss","scoring_elements":"0.96722","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0304"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=435123","reference_id":"435123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=435123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304","reference_id":"CVE-2008-0304","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-12","reference_id":"mfsa2008-12","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0304"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzxh-1prr-c7et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48641?format=json","vulnerability_id":"VCID-gy61-bm88-u3e7","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1233.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1233","reference_id":"","reference_type":"","scores":[{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95415","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.9543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.9544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19859","scoring_system":"epss","scoring_elements":"0.95463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24819","scoring_system":"epss","scoring_elements":"0.9617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24819","scoring_system":"epss","scoring_elements":"0.96169","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438713","reference_id":"438713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233","reference_id":"CVE-2008-1233","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14","reference_id":"mfsa2008-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"},{"reference_url":"https://usn.ubuntu.com/605-1/","reference_id":"USN-605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/605-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1233"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gy61-bm88-u3e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48633?format=json","vulnerability_id":"VCID-h91r-2kyx-v7f8","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0419","reference_id":"","reference_type":"","scores":[{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.9527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18686","scoring_system":"epss","scoring_elements":"0.95294","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0419"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431749","reference_id":"431749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419","reference_id":"CVE-2008-0419","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-06","reference_id":"mfsa2008-06","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0419"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h91r-2kyx-v7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48642?format=json","vulnerability_id":"VCID-jktq-6e2e-2ya7","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1234.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1234.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1234","reference_id":"","reference_type":"","scores":[{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91571","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.9159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07194","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09458","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09458","scoring_system":"epss","scoring_elements":"0.92833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09458","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1234"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438715","reference_id":"438715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234","reference_id":"CVE-2008-1234","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14","reference_id":"mfsa2008-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"},{"reference_url":"https://usn.ubuntu.com/605-1/","reference_id":"USN-605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/605-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1234"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jktq-6e2e-2ya7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48651?format=json","vulnerability_id":"VCID-m1wx-33dp-myds","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1241.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1241","reference_id":"","reference_type":"","scores":[{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.8727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87255","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03312","scoring_system":"epss","scoring_elements":"0.87276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04431","scoring_system":"epss","scoring_elements":"0.89077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04431","scoring_system":"epss","scoring_elements":"0.89067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04431","scoring_system":"epss","scoring_elements":"0.89075","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438730","reference_id":"438730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241","reference_id":"CVE-2008-1241","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-19","reference_id":"mfsa2008-19","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1241"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1wx-33dp-myds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48628?format=json","vulnerability_id":"VCID-mzfs-kyvw-qqe4","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0417","reference_id":"","reference_type":"","scores":[{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84043","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84162","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02112","scoring_system":"epss","scoring_elements":"0.84169","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431742","reference_id":"431742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417","reference_id":"CVE-2008-0417","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-04","reference_id":"mfsa2008-04","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0417"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mzfs-kyvw-qqe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48631?format=json","vulnerability_id":"VCID-pkeq-w64f-5bda","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0418","reference_id":"","reference_type":"","scores":[{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38662","scoring_system":"epss","scoring_elements":"0.97263","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431748","reference_id":"431748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418","reference_id":"CVE-2008-0418","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt","reference_id":"CVE-2008-0418;OSVDB-41187","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt"},{"reference_url":"https://www.securityfocus.com/bid/27406/info","reference_id":"CVE-2008-0418;OSVDB-41187","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/27406/info"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-05","reference_id":"mfsa2008-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0418"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pkeq-w64f-5bda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48621?format=json","vulnerability_id":"VCID-pr7b-3h2r-aubm","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0413","reference_id":"","reference_type":"","scores":[{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92094","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.9213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0805","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0413"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431733","reference_id":"431733","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413","reference_id":"CVE-2008-0413","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01","reference_id":"mfsa2008-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0413"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pr7b-3h2r-aubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48645?format=json","vulnerability_id":"VCID-snrh-b3y9-gybx","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1237.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1237","reference_id":"","reference_type":"","scores":[{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96256","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.9627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.96281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26048","scoring_system":"epss","scoring_elements":"0.9629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31817","scoring_system":"epss","scoring_elements":"0.96818","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1237"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438721","reference_id":"438721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237","reference_id":"CVE-2008-1237","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-15","reference_id":"mfsa2008-15","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-20","reference_id":"mfsa2008-20","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0207","reference_id":"RHSA-2008:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0208","reference_id":"RHSA-2008:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0209","reference_id":"RHSA-2008:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0209"},{"reference_url":"https://usn.ubuntu.com/592-1/","reference_id":"USN-592-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/592-1/"},{"reference_url":"https://usn.ubuntu.com/605-1/","reference_id":"USN-605-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/605-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-1237"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snrh-b3y9-gybx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48640?format=json","vulnerability_id":"VCID-swhd-4ja4-43h6","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0594","reference_id":"","reference_type":"","scores":[{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.8231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01811","scoring_system":"epss","scoring_elements":"0.82907","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01811","scoring_system":"epss","scoring_elements":"0.82902","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0594"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=432036","reference_id":"432036","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=432036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594","reference_id":"CVE-2008-0594","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-11","reference_id":"mfsa2008-11","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-11"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0594"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swhd-4ja4-43h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48639?format=json","vulnerability_id":"VCID-vrc7-3rm4-b3fk","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0593","reference_id":"","reference_type":"","scores":[{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78037","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77973","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78023","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0593"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431756","reference_id":"431756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593","reference_id":"CVE-2008-0593","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-10","reference_id":"mfsa2008-10","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0593"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrc7-3rm4-b3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48615?format=json","vulnerability_id":"VCID-vvtb-nt5x-3yh9","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0412","reference_id":"","reference_type":"","scores":[{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93605","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93614","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93651","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11553","scoring_system":"epss","scoring_elements":"0.93665","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431732","reference_id":"431732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412","reference_id":"CVE-2008-0412","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01","reference_id":"mfsa2008-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"},{"reference_url":"https://usn.ubuntu.com/582-1/","reference_id":"USN-582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0412"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vvtb-nt5x-3yh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48638?format=json","vulnerability_id":"VCID-xv3s-67bq-1ugj","summary":"Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0592","reference_id":"","reference_type":"","scores":[{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.8742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0592"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431752","reference_id":"431752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592","reference_id":"CVE-2008-0592","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592"},{"reference_url":"https://security.gentoo.org/glsa/200805-18","reference_id":"GLSA-200805-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-09","reference_id":"mfsa2008-09","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2008-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0103","reference_id":"RHSA-2008:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0104","reference_id":"RHSA-2008:0104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0105","reference_id":"RHSA-2008:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0105"},{"reference_url":"https://usn.ubuntu.com/576-1/","reference_id":"USN-576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77574?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/77575?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.1.9-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.9-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/77576?format=json","purl":"pkg:ebuild/net-libs/xulrunner@1.8.1.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.14"},{"url":"http://public2.vulnerablecode.io/api/packages/77577?format=json","purl":"pkg:ebuild/net-libs/xulrunner@2.0.0.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}],"aliases":["CVE-2008-0592"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xv3s-67bq-1ugj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.14"}