{"url":"http://public2.vulnerablecode.io/api/packages/128779?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.151.0-1?arch=el4","type":"rpm","namespace":"redhat","name":"flash-plugin","version":"9.0.151.0-1","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41801?format=json","vulnerability_id":"VCID-1zpq-gs32-ubg6","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4821","reference_id":"","reference_type":"","scores":[{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90493","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.9038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90407","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90455","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90473","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05688","scoring_system":"epss","scoring_elements":"0.90486","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4821"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46534","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46534"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/32129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32129"},{"reference_url":"http://www.securitytracker.com/id?1021149","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021149"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=470131","reference_id":"470131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=470131"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4821","reference_id":"CVE-2008-4821","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4821"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4821"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1zpq-gs32-ubg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49243?format=json","vulnerability_id":"VCID-2b8m-zcvw-sfa8","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4324","reference_id":"","reference_type":"","scores":[{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95538","published_at":"2026-05-15T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95481","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.9549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95492","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95502","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95513","published_at":"2026-05-09T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95523","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20036","scoring_system":"epss","scoring_elements":"0.95536","published_at":"2026-05-14T12:55:00Z"},{"value":"0.22239","scoring_system":"epss","scoring_elements":"0.95769","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4324"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=252292","reference_id":"252292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=252292"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2007-4324"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2b8m-zcvw-sfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41799?format=json","vulnerability_id":"VCID-51dm-n7tt-5qe5","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4818","reference_id":"","reference_type":"","scores":[{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95175","published_at":"2026-05-15T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95103","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95105","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.9514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.9515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95155","published_at":"2026-05-11T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95161","published_at":"2026-05-12T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95173","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4818"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46531","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46531"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/32129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32129"},{"reference_url":"http://www.securitytracker.com/id?1021146","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021146"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=470116","reference_id":"470116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=470116"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4818","reference_id":"CVE-2008-4818","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4818"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4818"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51dm-n7tt-5qe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41808?format=json","vulnerability_id":"VCID-6rcd-pqxw-dbhk","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5363","reference_id":"","reference_type":"","scores":[{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87977","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.8781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87864","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87927","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87925","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87937","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.8797","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5363"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://securityreason.com/securityalert/4692","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/4692"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html"},{"reference_url":"http://www.isecpartners.com/advisories/2008-01-flash.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.isecpartners.com/advisories/2008-01-flash.txt"},{"reference_url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618339","reference_id":"1618339","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618339"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5363","reference_id":"CVE-2008-5363","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5363"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-5363"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcd-pqxw-dbhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41796?format=json","vulnerability_id":"VCID-avg5-yvm3-5qar","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4401","reference_id":"","reference_type":"","scores":[{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92557","published_at":"2026-05-15T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92471","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92482","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92485","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92488","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92495","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92505","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92519","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92526","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08676","scoring_system":"epss","scoring_elements":"0.92551","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4401"},{"reference_url":"http://secunia.com/advisories/32270","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32270"},{"reference_url":"http://secunia.com/advisories/32448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32448"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/32759","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32759"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://securitytracker.com/id?1021061","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021061"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45913","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45913"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2838","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=466154","reference_id":"466154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=466154"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4401","reference_id":"CVE-2008-4401","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4401"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4401"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-avg5-yvm3-5qar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40016?format=json","vulnerability_id":"VCID-h93k-zzy5-euhq","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243","reference_id":"","reference_type":"","scores":[{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97275","published_at":"2026-04-24T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97278","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-05-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97298","published_at":"2026-05-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-05-12T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97311","published_at":"2026-05-14T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97312","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664","reference_id":"440664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2007-6243"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41800?format=json","vulnerability_id":"VCID-j7bq-mz97-k7e3","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4819","reference_id":"","reference_type":"","scores":[{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96578","published_at":"2026-05-15T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96506","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.9651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96553","published_at":"2026-05-05T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-05-09T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96562","published_at":"2026-05-11T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96567","published_at":"2026-05-12T12:55:00Z"},{"value":"0.28529","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4819"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46532","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46532"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/32129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32129"},{"reference_url":"http://www.securitytracker.com/id?1021147","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021147"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=470123","reference_id":"470123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=470123"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4819","reference_id":"CVE-2008-4819","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4819"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4819"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7bq-mz97-k7e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41804?format=json","vulnerability_id":"VCID-jqxw-6npu-ykd1","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"http://osvdb.org/49958","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/49958"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4824","reference_id":"","reference_type":"","scores":[{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97808","published_at":"2026-05-15T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97756","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.9778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.9779","published_at":"2026-05-05T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97791","published_at":"2026-05-07T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97793","published_at":"2026-05-09T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97794","published_at":"2026-05-11T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97799","published_at":"2026-05-12T12:55:00Z"},{"value":"0.49036","scoring_system":"epss","scoring_elements":"0.97805","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4824"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/32772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32772"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html"},{"reference_url":"http://www.isecpartners.com/advisories/2008-01-flash.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.isecpartners.com/advisories/2008-01-flash.txt"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3189","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3189"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618335","reference_id":"1618335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618335"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4824","reference_id":"CVE-2008-4824","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4824"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4824"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqxw-6npu-ykd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41803?format=json","vulnerability_id":"VCID-jxu2-azw2-bbfs","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4823","reference_id":"","reference_type":"","scores":[{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95175","published_at":"2026-05-15T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95103","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95105","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.9514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.9515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95155","published_at":"2026-05-11T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95161","published_at":"2026-05-12T12:55:00Z"},{"value":"0.17674","scoring_system":"epss","scoring_elements":"0.95173","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4823"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/32129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32129"},{"reference_url":"http://www.securitytracker.com/id?1021151","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021151"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=470128","reference_id":"470128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=470128"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4823","reference_id":"CVE-2008-4823","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4823"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4823"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxu2-azw2-bbfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41794?format=json","vulnerability_id":"VCID-ktjz-rbrw-nyhm","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html","reference_id":"","reference_type":"","scores":[],"url":"http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html"},{"reference_url":"http://blogs.zdnet.com/security/?p=1733","reference_id":"","reference_type":"","scores":[],"url":"http://blogs.zdnet.com/security/?p=1733"},{"reference_url":"http://blogs.zdnet.com/security/?p=1759","reference_id":"","reference_type":"","scores":[],"url":"http://blogs.zdnet.com/security/?p=1759"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3873","reference_id":"","reference_type":"","scores":[{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89965","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89833","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89855","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89875","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.8989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89926","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05143","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3873"},{"reference_url":"http://secunia.com/advisories/32448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32448"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/32759","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32759"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://securitytracker.com/id?1020724","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020724"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44584","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44584"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/31117","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31117"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2838","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=465736","reference_id":"465736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=465736"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3873","reference_id":"CVE-2008-3873","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3873"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-3873"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktjz-rbrw-nyhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41797?format=json","vulnerability_id":"VCID-uh21-ps74-wyaq","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/","reference_id":"","reference_type":"","scores":[],"url":"http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/"},{"reference_url":"http://ha.ckers.org/blog/20081007/clickjacking-details/","reference_id":"","reference_type":"","scores":[],"url":"http://ha.ckers.org/blog/20081007/clickjacking-details/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4503","reference_id":"","reference_type":"","scores":[{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92586","published_at":"2026-05-15T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.9249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92516","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92523","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92534","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92545","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92549","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.92555","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08732","scoring_system":"epss","scoring_elements":"0.9258","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4503"},{"reference_url":"http://secunia.com/advisories/32163","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32163"},{"reference_url":"http://secunia.com/advisories/32448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32448"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/32759","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32759"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45721","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45721"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://www.adobe.com/support/security/advisories/apsa08-08.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/advisories/apsa08-08.html"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-18.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0945.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/31625","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31625"},{"reference_url":"http://www.securitytracker.com/id?1020996","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020996"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2764","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2764"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=466344","reference_id":"466344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=466344"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4503","reference_id":"CVE-2008-4503","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4503"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4503"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh21-ps74-wyaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41805?format=json","vulnerability_id":"VCID-ujwj-eby4-xfg4","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5361","reference_id":"","reference_type":"","scores":[{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86888","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86753","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86759","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86804","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86823","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8684","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86836","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86878","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5361"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://securityreason.com/securityalert/4692","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/4692"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html"},{"reference_url":"http://www.isecpartners.com/advisories/2008-01-flash.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.isecpartners.com/advisories/2008-01-flash.txt"},{"reference_url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618337","reference_id":"1618337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618337"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5361","reference_id":"CVE-2008-5361","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5361"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-5361"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujwj-eby4-xfg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41806?format=json","vulnerability_id":"VCID-yc7j-b5gb-jqe5","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5362","reference_id":"","reference_type":"","scores":[{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86888","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86753","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86759","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86804","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86823","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.8684","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86836","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03068","scoring_system":"epss","scoring_elements":"0.86878","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5362"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"http://securityreason.com/securityalert/4692","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/4692"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-22.html"},{"reference_url":"http://www.isecpartners.com/advisories/2008-01-flash.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.isecpartners.com/advisories/2008-01-flash.txt"},{"reference_url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498561/100/0/threaded"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618338","reference_id":"1618338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618338"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5362","reference_id":"CVE-2008-5362","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5362"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-5362"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yc7j-b5gb-jqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41802?format=json","vulnerability_id":"VCID-yzky-wqbj-2bh4","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4822","reference_id":"","reference_type":"","scores":[{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-05-15T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95664","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.9568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.9571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95729","published_at":"2026-05-07T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95735","published_at":"2026-05-09T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95741","published_at":"2026-05-11T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95745","published_at":"2026-05-12T12:55:00Z"},{"value":"0.21364","scoring_system":"epss","scoring_elements":"0.95758","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4822"},{"reference_url":"http://secunia.com/advisories/32702","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32702"},{"reference_url":"http://secunia.com/advisories/33179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33179"},{"reference_url":"http://secunia.com/advisories/33390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33390"},{"reference_url":"http://secunia.com/advisories/34226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34226"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46535","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46535"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"},{"reference_url":"http://support.apple.com/kb/HT3338","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3338"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html"},{"reference_url":"http://www.securityfocus.com/bid/32129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32129"},{"reference_url":"http://www.securitytracker.com/id?1021150","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021150"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3444","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=470130","reference_id":"470130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=470130"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4822","reference_id":"CVE-2008-4822","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4822"},{"reference_url":"https://security.gentoo.org/glsa/200903-23","reference_id":"GLSA-200903-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2008-4822"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yzky-wqbj-2bh4"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.151.0-1%3Farch=el4"}