Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/flash-plugin@9.0.151.0-1.el3.with?arch=oss
Typerpm
Namespaceredhat
Nameflash-plugin
Version9.0.151.0-1.el3.with
Qualifiers
arch oss
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1zpq-gs32-ubg6
vulnerability_id VCID-1zpq-gs32-ubg6
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4821
reference_id
reference_type
scores
0
value 0.05688
scoring_system epss
scoring_elements 0.90416
published_at 2026-04-18T12:55:00Z
1
value 0.05688
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-01T12:55:00Z
2
value 0.05688
scoring_system epss
scoring_elements 0.90363
published_at 2026-04-02T12:55:00Z
3
value 0.05688
scoring_system epss
scoring_elements 0.90375
published_at 2026-04-04T12:55:00Z
4
value 0.05688
scoring_system epss
scoring_elements 0.9038
published_at 2026-04-07T12:55:00Z
5
value 0.05688
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-08T12:55:00Z
6
value 0.05688
scoring_system epss
scoring_elements 0.904
published_at 2026-04-09T12:55:00Z
7
value 0.05688
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-11T12:55:00Z
8
value 0.05688
scoring_system epss
scoring_elements 0.90407
published_at 2026-04-12T12:55:00Z
9
value 0.05688
scoring_system epss
scoring_elements 0.90401
published_at 2026-04-13T12:55:00Z
10
value 0.05688
scoring_system epss
scoring_elements 0.90417
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4821
3
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
4
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
5
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
6
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
7
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46534
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46534
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
10
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
11
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
12
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
13
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
14
reference_url http://www.adobe.com/support/security/bulletins/apsb08-20.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-20.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
16
reference_url http://www.securityfocus.com/bid/32129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32129
17
reference_url http://www.securitytracker.com/id?1021149
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021149
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470131
reference_id 470131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470131
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4821
reference_id CVE-2008-4821
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4821
45
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
46
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
47
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4821
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1zpq-gs32-ubg6
1
url VCID-2b8m-zcvw-sfa8
vulnerability_id VCID-2b8m-zcvw-sfa8
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4324
reference_id
reference_type
scores
0
value 0.20036
scoring_system epss
scoring_elements 0.95486
published_at 2026-04-18T12:55:00Z
1
value 0.20036
scoring_system epss
scoring_elements 0.95448
published_at 2026-04-02T12:55:00Z
2
value 0.20036
scoring_system epss
scoring_elements 0.95453
published_at 2026-04-04T12:55:00Z
3
value 0.20036
scoring_system epss
scoring_elements 0.95457
published_at 2026-04-07T12:55:00Z
4
value 0.20036
scoring_system epss
scoring_elements 0.95463
published_at 2026-04-08T12:55:00Z
5
value 0.20036
scoring_system epss
scoring_elements 0.95466
published_at 2026-04-09T12:55:00Z
6
value 0.20036
scoring_system epss
scoring_elements 0.95471
published_at 2026-04-12T12:55:00Z
7
value 0.20036
scoring_system epss
scoring_elements 0.95472
published_at 2026-04-13T12:55:00Z
8
value 0.20036
scoring_system epss
scoring_elements 0.95481
published_at 2026-04-16T12:55:00Z
9
value 0.22239
scoring_system epss
scoring_elements 0.95769
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4324
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=252292
reference_id 252292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=252292
3
reference_url https://security.gentoo.org/glsa/200801-07
reference_id GLSA-200801-07
reference_type
scores
url https://security.gentoo.org/glsa/200801-07
4
reference_url https://access.redhat.com/errata/RHSA-2007:1126
reference_id RHSA-2007:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1126
5
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
6
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2007-4324
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b8m-zcvw-sfa8
2
url VCID-51dm-n7tt-5qe5
vulnerability_id VCID-51dm-n7tt-5qe5
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4818
reference_id
reference_type
scores
0
value 0.17674
scoring_system epss
scoring_elements 0.95118
published_at 2026-04-18T12:55:00Z
1
value 0.17674
scoring_system epss
scoring_elements 0.95074
published_at 2026-04-01T12:55:00Z
2
value 0.17674
scoring_system epss
scoring_elements 0.95084
published_at 2026-04-04T12:55:00Z
3
value 0.17674
scoring_system epss
scoring_elements 0.95086
published_at 2026-04-07T12:55:00Z
4
value 0.17674
scoring_system epss
scoring_elements 0.95094
published_at 2026-04-08T12:55:00Z
5
value 0.17674
scoring_system epss
scoring_elements 0.95097
published_at 2026-04-09T12:55:00Z
6
value 0.17674
scoring_system epss
scoring_elements 0.95103
published_at 2026-04-11T12:55:00Z
7
value 0.17674
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-12T12:55:00Z
8
value 0.17674
scoring_system epss
scoring_elements 0.95107
published_at 2026-04-13T12:55:00Z
9
value 0.17674
scoring_system epss
scoring_elements 0.95116
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4818
3
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
4
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
5
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
6
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
7
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46531
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46531
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
10
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
11
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
12
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
13
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
14
reference_url http://www.adobe.com/support/security/bulletins/apsb08-20.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-20.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
16
reference_url http://www.securityfocus.com/bid/32129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32129
17
reference_url http://www.securitytracker.com/id?1021146
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021146
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470116
reference_id 470116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470116
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4818
reference_id CVE-2008-4818
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4818
42
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
43
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
44
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4818
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51dm-n7tt-5qe5
3
url VCID-6rcd-pqxw-dbhk
vulnerability_id VCID-6rcd-pqxw-dbhk
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5363
reference_id
reference_type
scores
0
value 0.03642
scoring_system epss
scoring_elements 0.87869
published_at 2026-04-18T12:55:00Z
1
value 0.03642
scoring_system epss
scoring_elements 0.878
published_at 2026-04-01T12:55:00Z
2
value 0.03642
scoring_system epss
scoring_elements 0.8781
published_at 2026-04-02T12:55:00Z
3
value 0.03642
scoring_system epss
scoring_elements 0.87821
published_at 2026-04-04T12:55:00Z
4
value 0.03642
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-07T12:55:00Z
5
value 0.03642
scoring_system epss
scoring_elements 0.87847
published_at 2026-04-08T12:55:00Z
6
value 0.03642
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-09T12:55:00Z
7
value 0.03642
scoring_system epss
scoring_elements 0.87864
published_at 2026-04-11T12:55:00Z
8
value 0.03642
scoring_system epss
scoring_elements 0.87858
published_at 2026-04-12T12:55:00Z
9
value 0.03642
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-13T12:55:00Z
10
value 0.03642
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5363
2
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
3
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
4
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
5
reference_url http://securityreason.com/securityalert/4692
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4692
6
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
7
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
8
reference_url http://www.adobe.com/support/security/bulletins/apsb08-22.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-22.html
9
reference_url http://www.isecpartners.com/advisories/2008-01-flash.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2008-01-flash.txt
10
reference_url http://www.securityfocus.com/archive/1/498561/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498561/100/0/threaded
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618339
reference_id 1618339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618339
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5363
reference_id CVE-2008-5363
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5363
15
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
16
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
17
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-5363
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcd-pqxw-dbhk
4
url VCID-avg5-yvm3-5qar
vulnerability_id VCID-avg5-yvm3-5qar
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4401
reference_id
reference_type
scores
0
value 0.08676
scoring_system epss
scoring_elements 0.92482
published_at 2026-04-18T12:55:00Z
1
value 0.08676
scoring_system epss
scoring_elements 0.92431
published_at 2026-04-01T12:55:00Z
2
value 0.08676
scoring_system epss
scoring_elements 0.92438
published_at 2026-04-02T12:55:00Z
3
value 0.08676
scoring_system epss
scoring_elements 0.92446
published_at 2026-04-04T12:55:00Z
4
value 0.08676
scoring_system epss
scoring_elements 0.92449
published_at 2026-04-07T12:55:00Z
5
value 0.08676
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-08T12:55:00Z
6
value 0.08676
scoring_system epss
scoring_elements 0.92465
published_at 2026-04-09T12:55:00Z
7
value 0.08676
scoring_system epss
scoring_elements 0.92471
published_at 2026-04-11T12:55:00Z
8
value 0.08676
scoring_system epss
scoring_elements 0.92474
published_at 2026-04-12T12:55:00Z
9
value 0.08676
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-13T12:55:00Z
10
value 0.08676
scoring_system epss
scoring_elements 0.92483
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4401
3
reference_url http://secunia.com/advisories/32270
reference_id
reference_type
scores
url http://secunia.com/advisories/32270
4
reference_url http://secunia.com/advisories/32448
reference_id
reference_type
scores
url http://secunia.com/advisories/32448
5
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
6
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
7
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
8
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
9
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
10
reference_url http://securitytracker.com/id?1021061
reference_id
reference_type
scores
url http://securitytracker.com/id?1021061
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45913
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45913
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
13
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
14
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
15
reference_url http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
reference_id
reference_type
scores
url http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
16
reference_url http://www.adobe.com/support/security/bulletins/apsb08-18.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-18.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2008-0945.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0945.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
19
reference_url http://www.vupen.com/english/advisories/2008/2838
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2838
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=466154
reference_id 466154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=466154
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4401
reference_id CVE-2008-4401
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4401
42
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
43
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
44
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4401
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avg5-yvm3-5qar
5
url VCID-h93k-zzy5-euhq
vulnerability_id VCID-h93k-zzy5-euhq
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6243
reference_id
reference_type
scores
0
value 0.38894
scoring_system epss
scoring_elements 0.97238
published_at 2026-04-01T12:55:00Z
1
value 0.38894
scoring_system epss
scoring_elements 0.97244
published_at 2026-04-02T12:55:00Z
2
value 0.38894
scoring_system epss
scoring_elements 0.97249
published_at 2026-04-04T12:55:00Z
3
value 0.38894
scoring_system epss
scoring_elements 0.9725
published_at 2026-04-07T12:55:00Z
4
value 0.38894
scoring_system epss
scoring_elements 0.97256
published_at 2026-04-08T12:55:00Z
5
value 0.38894
scoring_system epss
scoring_elements 0.97257
published_at 2026-04-09T12:55:00Z
6
value 0.38894
scoring_system epss
scoring_elements 0.97261
published_at 2026-04-11T12:55:00Z
7
value 0.38894
scoring_system epss
scoring_elements 0.97262
published_at 2026-04-13T12:55:00Z
8
value 0.38894
scoring_system epss
scoring_elements 0.9727
published_at 2026-04-16T12:55:00Z
9
value 0.38894
scoring_system epss
scoring_elements 0.97272
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6243
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440664
reference_id 440664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440664
3
reference_url https://security.gentoo.org/glsa/200801-07
reference_id GLSA-200801-07
reference_type
scores
url https://security.gentoo.org/glsa/200801-07
4
reference_url https://security.gentoo.org/glsa/200804-21
reference_id GLSA-200804-21
reference_type
scores
url https://security.gentoo.org/glsa/200804-21
5
reference_url https://access.redhat.com/errata/RHSA-2007:1126
reference_id RHSA-2007:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1126
6
reference_url https://access.redhat.com/errata/RHSA-2008:0221
reference_id RHSA-2008:0221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0221
7
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
8
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2007-6243
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq
6
url VCID-j7bq-mz97-k7e3
vulnerability_id VCID-j7bq-mz97-k7e3
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4819
reference_id
reference_type
scores
0
value 0.28529
scoring_system epss
scoring_elements 0.96543
published_at 2026-04-18T12:55:00Z
1
value 0.28529
scoring_system epss
scoring_elements 0.96497
published_at 2026-04-01T12:55:00Z
2
value 0.28529
scoring_system epss
scoring_elements 0.96506
published_at 2026-04-02T12:55:00Z
3
value 0.28529
scoring_system epss
scoring_elements 0.9651
published_at 2026-04-04T12:55:00Z
4
value 0.28529
scoring_system epss
scoring_elements 0.96514
published_at 2026-04-07T12:55:00Z
5
value 0.28529
scoring_system epss
scoring_elements 0.96522
published_at 2026-04-08T12:55:00Z
6
value 0.28529
scoring_system epss
scoring_elements 0.96524
published_at 2026-04-09T12:55:00Z
7
value 0.28529
scoring_system epss
scoring_elements 0.96528
published_at 2026-04-12T12:55:00Z
8
value 0.28529
scoring_system epss
scoring_elements 0.96531
published_at 2026-04-13T12:55:00Z
9
value 0.28529
scoring_system epss
scoring_elements 0.96537
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4819
3
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
4
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
5
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
6
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
7
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46532
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46532
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
10
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
11
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
12
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
13
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
14
reference_url http://www.adobe.com/support/security/bulletins/apsb08-20.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-20.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
16
reference_url http://www.securityfocus.com/bid/32129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32129
17
reference_url http://www.securitytracker.com/id?1021147
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021147
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470123
reference_id 470123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470123
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4819
reference_id CVE-2008-4819
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4819
42
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
43
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
44
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4819
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7bq-mz97-k7e3
7
url VCID-jqxw-6npu-ykd1
vulnerability_id VCID-jqxw-6npu-ykd1
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url http://osvdb.org/49958
reference_id
reference_type
scores
url http://osvdb.org/49958
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4824
reference_id
reference_type
scores
0
value 0.49036
scoring_system epss
scoring_elements 0.97781
published_at 2026-04-18T12:55:00Z
1
value 0.49036
scoring_system epss
scoring_elements 0.97749
published_at 2026-04-01T12:55:00Z
2
value 0.49036
scoring_system epss
scoring_elements 0.97755
published_at 2026-04-02T12:55:00Z
3
value 0.49036
scoring_system epss
scoring_elements 0.97756
published_at 2026-04-04T12:55:00Z
4
value 0.49036
scoring_system epss
scoring_elements 0.97758
published_at 2026-04-07T12:55:00Z
5
value 0.49036
scoring_system epss
scoring_elements 0.97763
published_at 2026-04-08T12:55:00Z
6
value 0.49036
scoring_system epss
scoring_elements 0.97767
published_at 2026-04-09T12:55:00Z
7
value 0.49036
scoring_system epss
scoring_elements 0.9777
published_at 2026-04-11T12:55:00Z
8
value 0.49036
scoring_system epss
scoring_elements 0.97772
published_at 2026-04-12T12:55:00Z
9
value 0.49036
scoring_system epss
scoring_elements 0.97773
published_at 2026-04-13T12:55:00Z
10
value 0.49036
scoring_system epss
scoring_elements 0.97779
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4824
4
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
5
reference_url http://secunia.com/advisories/32772
reference_id
reference_type
scores
url http://secunia.com/advisories/32772
6
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
7
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
8
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
9
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
11
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
12
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
13
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
14
reference_url http://www.adobe.com/support/security/bulletins/apsb08-22.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-22.html
15
reference_url http://www.isecpartners.com/advisories/2008-01-flash.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2008-01-flash.txt
16
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
17
reference_url http://www.securityfocus.com/archive/1/498561/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498561/100/0/threaded
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3189
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3189
20
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618335
reference_id 1618335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618335
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4824
reference_id CVE-2008-4824
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4824
24
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
25
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
26
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4824
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqxw-6npu-ykd1
8
url VCID-jxu2-azw2-bbfs
vulnerability_id VCID-jxu2-azw2-bbfs
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4823
reference_id
reference_type
scores
0
value 0.17674
scoring_system epss
scoring_elements 0.95118
published_at 2026-04-18T12:55:00Z
1
value 0.17674
scoring_system epss
scoring_elements 0.95074
published_at 2026-04-01T12:55:00Z
2
value 0.17674
scoring_system epss
scoring_elements 0.95084
published_at 2026-04-04T12:55:00Z
3
value 0.17674
scoring_system epss
scoring_elements 0.95086
published_at 2026-04-07T12:55:00Z
4
value 0.17674
scoring_system epss
scoring_elements 0.95094
published_at 2026-04-08T12:55:00Z
5
value 0.17674
scoring_system epss
scoring_elements 0.95097
published_at 2026-04-09T12:55:00Z
6
value 0.17674
scoring_system epss
scoring_elements 0.95103
published_at 2026-04-11T12:55:00Z
7
value 0.17674
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-12T12:55:00Z
8
value 0.17674
scoring_system epss
scoring_elements 0.95107
published_at 2026-04-13T12:55:00Z
9
value 0.17674
scoring_system epss
scoring_elements 0.95116
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4823
3
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
4
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
5
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
6
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
7
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
8
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
9
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
10
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
11
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
12
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
13
reference_url http://www.adobe.com/support/security/bulletins/apsb08-20.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-20.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
15
reference_url http://www.securityfocus.com/bid/32129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32129
16
reference_url http://www.securitytracker.com/id?1021151
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021151
17
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
18
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470128
reference_id 470128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470128
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4823
reference_id CVE-2008-4823
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4823
41
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
42
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
43
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4823
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxu2-azw2-bbfs
9
url VCID-ktjz-rbrw-nyhm
vulnerability_id VCID-ktjz-rbrw-nyhm
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html
reference_id
reference_type
scores
url http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html
1
reference_url http://blogs.zdnet.com/security/?p=1733
reference_id
reference_type
scores
url http://blogs.zdnet.com/security/?p=1733
2
reference_url http://blogs.zdnet.com/security/?p=1759
reference_id
reference_type
scores
url http://blogs.zdnet.com/security/?p=1759
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3873
reference_id
reference_type
scores
0
value 0.05143
scoring_system epss
scoring_elements 0.8989
published_at 2026-04-18T12:55:00Z
1
value 0.05143
scoring_system epss
scoring_elements 0.89833
published_at 2026-04-01T12:55:00Z
2
value 0.05143
scoring_system epss
scoring_elements 0.89836
published_at 2026-04-02T12:55:00Z
3
value 0.05143
scoring_system epss
scoring_elements 0.89849
published_at 2026-04-04T12:55:00Z
4
value 0.05143
scoring_system epss
scoring_elements 0.89855
published_at 2026-04-07T12:55:00Z
5
value 0.05143
scoring_system epss
scoring_elements 0.89871
published_at 2026-04-08T12:55:00Z
6
value 0.05143
scoring_system epss
scoring_elements 0.89878
published_at 2026-04-09T12:55:00Z
7
value 0.05143
scoring_system epss
scoring_elements 0.89884
published_at 2026-04-11T12:55:00Z
8
value 0.05143
scoring_system epss
scoring_elements 0.89882
published_at 2026-04-12T12:55:00Z
9
value 0.05143
scoring_system epss
scoring_elements 0.89875
published_at 2026-04-13T12:55:00Z
10
value 0.05143
scoring_system epss
scoring_elements 0.89889
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3873
6
reference_url http://secunia.com/advisories/32448
reference_id
reference_type
scores
url http://secunia.com/advisories/32448
7
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
8
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
9
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
10
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
11
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
12
reference_url http://securitytracker.com/id?1020724
reference_id
reference_type
scores
url http://securitytracker.com/id?1020724
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44584
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44584
14
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
16
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
17
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
18
reference_url http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
reference_id
reference_type
scores
url http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
19
reference_url http://www.adobe.com/support/security/bulletins/apsb08-18.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-18.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2008-0945.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0945.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
22
reference_url http://www.securityfocus.com/bid/31117
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31117
23
reference_url http://www.vupen.com/english/advisories/2008/2838
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2838
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=465736
reference_id 465736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=465736
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3873
reference_id CVE-2008-3873
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3873
27
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
28
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
29
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-3873
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktjz-rbrw-nyhm
10
url VCID-uh21-ps74-wyaq
vulnerability_id VCID-uh21-ps74-wyaq
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/
reference_id
reference_type
scores
url http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/
1
reference_url http://ha.ckers.org/blog/20081007/clickjacking-details/
reference_id
reference_type
scores
url http://ha.ckers.org/blog/20081007/clickjacking-details/
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4503
reference_id
reference_type
scores
0
value 0.08732
scoring_system epss
scoring_elements 0.92511
published_at 2026-04-18T12:55:00Z
1
value 0.08732
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-01T12:55:00Z
2
value 0.08732
scoring_system epss
scoring_elements 0.92467
published_at 2026-04-02T12:55:00Z
3
value 0.08732
scoring_system epss
scoring_elements 0.92476
published_at 2026-04-04T12:55:00Z
4
value 0.08732
scoring_system epss
scoring_elements 0.92479
published_at 2026-04-07T12:55:00Z
5
value 0.08732
scoring_system epss
scoring_elements 0.9249
published_at 2026-04-08T12:55:00Z
6
value 0.08732
scoring_system epss
scoring_elements 0.92495
published_at 2026-04-09T12:55:00Z
7
value 0.08732
scoring_system epss
scoring_elements 0.92501
published_at 2026-04-13T12:55:00Z
8
value 0.08732
scoring_system epss
scoring_elements 0.92503
published_at 2026-04-12T12:55:00Z
9
value 0.08732
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4503
5
reference_url http://secunia.com/advisories/32163
reference_id
reference_type
scores
url http://secunia.com/advisories/32163
6
reference_url http://secunia.com/advisories/32448
reference_id
reference_type
scores
url http://secunia.com/advisories/32448
7
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
8
reference_url http://secunia.com/advisories/32759
reference_id
reference_type
scores
url http://secunia.com/advisories/32759
9
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
10
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
11
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45721
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45721
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
14
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
16
reference_url http://www.adobe.com/support/security/advisories/apsa08-08.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/advisories/apsa08-08.html
17
reference_url http://www.adobe.com/support/security/bulletins/apsb08-18.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-18.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-0945.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0945.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
20
reference_url http://www.securityfocus.com/bid/31625
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31625
21
reference_url http://www.securitytracker.com/id?1020996
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020996
22
reference_url http://www.vupen.com/english/advisories/2008/2764
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2764
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=466344
reference_id 466344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=466344
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4503
reference_id CVE-2008-4503
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4503
48
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
49
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
50
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4503
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh21-ps74-wyaq
11
url VCID-ujwj-eby4-xfg4
vulnerability_id VCID-ujwj-eby4-xfg4
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5361
reference_id
reference_type
scores
0
value 0.03068
scoring_system epss
scoring_elements 0.86763
published_at 2026-04-18T12:55:00Z
1
value 0.03068
scoring_system epss
scoring_elements 0.86681
published_at 2026-04-01T12:55:00Z
2
value 0.03068
scoring_system epss
scoring_elements 0.86692
published_at 2026-04-02T12:55:00Z
3
value 0.03068
scoring_system epss
scoring_elements 0.86711
published_at 2026-04-07T12:55:00Z
4
value 0.03068
scoring_system epss
scoring_elements 0.8673
published_at 2026-04-08T12:55:00Z
5
value 0.03068
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-09T12:55:00Z
6
value 0.03068
scoring_system epss
scoring_elements 0.86753
published_at 2026-04-11T12:55:00Z
7
value 0.03068
scoring_system epss
scoring_elements 0.8675
published_at 2026-04-12T12:55:00Z
8
value 0.03068
scoring_system epss
scoring_elements 0.86743
published_at 2026-04-13T12:55:00Z
9
value 0.03068
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5361
2
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
3
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
4
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
5
reference_url http://securityreason.com/securityalert/4692
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4692
6
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
7
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
8
reference_url http://www.adobe.com/support/security/bulletins/apsb08-22.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-22.html
9
reference_url http://www.isecpartners.com/advisories/2008-01-flash.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2008-01-flash.txt
10
reference_url http://www.securityfocus.com/archive/1/498561/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498561/100/0/threaded
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618337
reference_id 1618337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618337
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5361
reference_id CVE-2008-5361
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5361
15
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
16
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
17
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-5361
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujwj-eby4-xfg4
12
url VCID-yc7j-b5gb-jqe5
vulnerability_id VCID-yc7j-b5gb-jqe5
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5362
reference_id
reference_type
scores
0
value 0.03068
scoring_system epss
scoring_elements 0.86763
published_at 2026-04-18T12:55:00Z
1
value 0.03068
scoring_system epss
scoring_elements 0.86681
published_at 2026-04-01T12:55:00Z
2
value 0.03068
scoring_system epss
scoring_elements 0.86692
published_at 2026-04-02T12:55:00Z
3
value 0.03068
scoring_system epss
scoring_elements 0.86711
published_at 2026-04-07T12:55:00Z
4
value 0.03068
scoring_system epss
scoring_elements 0.8673
published_at 2026-04-08T12:55:00Z
5
value 0.03068
scoring_system epss
scoring_elements 0.86739
published_at 2026-04-09T12:55:00Z
6
value 0.03068
scoring_system epss
scoring_elements 0.86753
published_at 2026-04-11T12:55:00Z
7
value 0.03068
scoring_system epss
scoring_elements 0.8675
published_at 2026-04-12T12:55:00Z
8
value 0.03068
scoring_system epss
scoring_elements 0.86743
published_at 2026-04-13T12:55:00Z
9
value 0.03068
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5362
2
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
3
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
4
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
5
reference_url http://securityreason.com/securityalert/4692
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4692
6
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
7
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
8
reference_url http://www.adobe.com/support/security/bulletins/apsb08-22.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-22.html
9
reference_url http://www.isecpartners.com/advisories/2008-01-flash.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2008-01-flash.txt
10
reference_url http://www.securityfocus.com/archive/1/498561/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498561/100/0/threaded
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618338
reference_id 1618338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618338
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5362
reference_id CVE-2008-5362
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5362
15
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
16
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
17
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-5362
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yc7j-b5gb-jqe5
13
url VCID-yzky-wqbj-2bh4
vulnerability_id VCID-yzky-wqbj-2bh4
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4822
reference_id
reference_type
scores
0
value 0.21364
scoring_system epss
scoring_elements 0.9571
published_at 2026-04-18T12:55:00Z
1
value 0.21364
scoring_system epss
scoring_elements 0.95664
published_at 2026-04-01T12:55:00Z
2
value 0.21364
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-02T12:55:00Z
3
value 0.21364
scoring_system epss
scoring_elements 0.95678
published_at 2026-04-04T12:55:00Z
4
value 0.21364
scoring_system epss
scoring_elements 0.9568
published_at 2026-04-07T12:55:00Z
5
value 0.21364
scoring_system epss
scoring_elements 0.95689
published_at 2026-04-08T12:55:00Z
6
value 0.21364
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-09T12:55:00Z
7
value 0.21364
scoring_system epss
scoring_elements 0.95697
published_at 2026-04-11T12:55:00Z
8
value 0.21364
scoring_system epss
scoring_elements 0.95696
published_at 2026-04-12T12:55:00Z
9
value 0.21364
scoring_system epss
scoring_elements 0.95698
published_at 2026-04-13T12:55:00Z
10
value 0.21364
scoring_system epss
scoring_elements 0.95706
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4822
3
reference_url http://secunia.com/advisories/32702
reference_id
reference_type
scores
url http://secunia.com/advisories/32702
4
reference_url http://secunia.com/advisories/33179
reference_id
reference_type
scores
url http://secunia.com/advisories/33179
5
reference_url http://secunia.com/advisories/33390
reference_id
reference_type
scores
url http://secunia.com/advisories/33390
6
reference_url http://secunia.com/advisories/34226
reference_id
reference_type
scores
url http://secunia.com/advisories/34226
7
reference_url http://security.gentoo.org/glsa/glsa-200903-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-23.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46535
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46535
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
10
reference_url http://support.apple.com/kb/HT3338
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3338
11
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
12
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
13
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
14
reference_url http://www.adobe.com/support/security/bulletins/apsb08-20.html
reference_id
reference_type
scores
url http://www.adobe.com/support/security/bulletins/apsb08-20.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-0980.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0980.html
16
reference_url http://www.securityfocus.com/bid/32129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32129
17
reference_url http://www.securitytracker.com/id?1021150
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021150
18
reference_url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-350A.html
19
reference_url http://www.vupen.com/english/advisories/2008/3444
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3444
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470130
reference_id 470130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470130
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4822
reference_id CVE-2008-4822
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4822
42
reference_url https://security.gentoo.org/glsa/200903-23
reference_id GLSA-200903-23
reference_type
scores
url https://security.gentoo.org/glsa/200903-23
43
reference_url https://access.redhat.com/errata/RHSA-2008:0945
reference_id RHSA-2008:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0945
44
reference_url https://access.redhat.com/errata/RHSA-2008:0980
reference_id RHSA-2008:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0980
fixed_packages
aliases CVE-2008-4822
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzky-wqbj-2bh4
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.151.0-1.el3.with%3Farch=oss