Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/128780?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/128780?format=api", "purl": "pkg:rpm/redhat/flash-plugin@10.0.12.36-2?arch=el5", "type": "rpm", "namespace": "redhat", "name": "flash-plugin", "version": "10.0.12.36-2", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41801?format=api", "vulnerability_id": "VCID-1zpq-gs32-ubg6", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90467", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90363", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.9038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90417", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90416", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90415", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90429", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90425", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90438", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05688", "scoring_system": "epss", "scoring_elements": "0.90455", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4821" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46534" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/32129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32129" }, { "reference_url": "http://www.securitytracker.com/id?1021149", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021149" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470131", "reference_id": "470131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470131" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:camino:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4821", "reference_id": "CVE-2008-4821", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4821" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4821" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zpq-gs32-ubg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49243?format=api", "vulnerability_id": "VCID-2b8m-zcvw-sfa8", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4324.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4324", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95457", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95486", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.9549", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95492", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95502", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20036", "scoring_system": "epss", "scoring_elements": "0.95506", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.22239", "scoring_system": "epss", "scoring_elements": "0.95769", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4324" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=252292", "reference_id": "252292", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=252292" }, { "reference_url": "https://security.gentoo.org/glsa/200801-07", "reference_id": "GLSA-200801-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200801-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1126", "reference_id": "RHSA-2007:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2007-4324" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2b8m-zcvw-sfa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41799?format=api", "vulnerability_id": "VCID-51dm-n7tt-5qe5", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4818.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.9515", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95097", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95103", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95105", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95107", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95118", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95121", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95122", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95123", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95135", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.9514", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4818" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46531" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/32129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32129" }, { "reference_url": "http://www.securitytracker.com/id?1021146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021146" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470116", "reference_id": "470116", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470116" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4818", "reference_id": "CVE-2008-4818", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4818" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4818" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51dm-n7tt-5qe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41808?format=api", "vulnerability_id": "VCID-6rcd-pqxw-dbhk", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87927", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.878", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.8781", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87847", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87864", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87871", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87882", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87888", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87885", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87896", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03642", "scoring_system": "epss", "scoring_elements": "0.87911", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5363" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://securityreason.com/securityalert/4692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4692" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html" }, { "reference_url": "http://www.isecpartners.com/advisories/2008-01-flash.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.isecpartners.com/advisories/2008-01-flash.txt" }, { "reference_url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618339", "reference_id": "1618339", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618339" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5363", "reference_id": "CVE-2008-5363", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5363" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5363" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rcd-pqxw-dbhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41796?format=api", "vulnerability_id": "VCID-avg5-yvm3-5qar", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92516", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92431", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92438", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.9246", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92471", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92482", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92485", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92488", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92495", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08676", "scoring_system": "epss", "scoring_elements": "0.92505", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4401" }, { "reference_url": "http://secunia.com/advisories/32270", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32270" }, { "reference_url": "http://secunia.com/advisories/32448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32448" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/32759", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32759" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://securitytracker.com/id?1021061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1021061" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45913" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2838", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2838" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=466154", "reference_id": "466154", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=466154" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4401", "reference_id": "CVE-2008-4401", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4401" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4401" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-avg5-yvm3-5qar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40016?format=api", "vulnerability_id": "VCID-h93k-zzy5-euhq", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6243", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97238", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.9725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.9727", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97272", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97274", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97275", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97276", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97278", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97283", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97288", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.38894", "scoring_system": "epss", "scoring_elements": "0.97292", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6243" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664", "reference_id": "440664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664" }, { "reference_url": "https://security.gentoo.org/glsa/200801-07", "reference_id": "GLSA-200801-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200801-07" }, { "reference_url": "https://security.gentoo.org/glsa/200804-21", "reference_id": "GLSA-200804-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200804-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1126", "reference_id": "RHSA-2007:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221", "reference_id": "RHSA-2008:0221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2007-6243" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41800?format=api", "vulnerability_id": "VCID-j7bq-mz97-k7e3", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4819.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4819", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.9656", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.9651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96522", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96537", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96543", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96545", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96553", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.28529", "scoring_system": "epss", "scoring_elements": "0.96554", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4819" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46532" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/32129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32129" }, { "reference_url": "http://www.securitytracker.com/id?1021147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021147" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470123", "reference_id": "470123", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470123" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4819", "reference_id": "CVE-2008-4819", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4819" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4819" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7bq-mz97-k7e3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41804?format=api", "vulnerability_id": "VCID-jqxw-6npu-ykd1", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "http://osvdb.org/49958", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/49958" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97793", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97749", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97756", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97758", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97763", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.9777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97773", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97781", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.9778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.9779", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.49036", "scoring_system": "epss", "scoring_elements": "0.97791", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4824" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/32772", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32772" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html" }, { "reference_url": "http://www.isecpartners.com/advisories/2008-01-flash.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.isecpartners.com/advisories/2008-01-flash.txt" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3189" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618335", "reference_id": "1618335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618335" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4824", "reference_id": "CVE-2008-4824", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4824" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4824" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqxw-6npu-ykd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41803?format=api", "vulnerability_id": "VCID-jxu2-azw2-bbfs", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.9515", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95097", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95103", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95105", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95107", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95118", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95121", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95122", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95123", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.95135", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17674", "scoring_system": "epss", "scoring_elements": "0.9514", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4823" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/32129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32129" }, { "reference_url": "http://www.securitytracker.com/id?1021151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021151" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470128", "reference_id": "470128", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4823", "reference_id": "CVE-2008-4823", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4823" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4823" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jxu2-azw2-bbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41794?format=api", "vulnerability_id": "VCID-ktjz-rbrw-nyhm", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html" }, { "reference_url": "http://blogs.zdnet.com/security/?p=1733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blogs.zdnet.com/security/?p=1733" }, { "reference_url": "http://blogs.zdnet.com/security/?p=1759", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blogs.zdnet.com/security/?p=1759" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3873.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3873", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89937", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89833", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89849", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89855", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89878", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89884", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89875", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89889", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.8989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89899", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89912", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05143", "scoring_system": "epss", "scoring_elements": "0.89926", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3873" }, { "reference_url": "http://secunia.com/advisories/32448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32448" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/32759", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32759" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://securitytracker.com/id?1020724", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020724" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/31117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31117" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2838", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2838" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=465736", "reference_id": "465736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=465736" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3873", "reference_id": "CVE-2008-3873", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3873" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-3873" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktjz-rbrw-nyhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41797?format=api", "vulnerability_id": "VCID-uh21-ps74-wyaq", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/" }, { "reference_url": "http://ha.ckers.org/blog/20081007/clickjacking-details/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ha.ckers.org/blog/20081007/clickjacking-details/" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4503.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4503", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92545", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92461", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92467", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92476", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.9249", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92503", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92512", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92515", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92516", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92517", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92523", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08732", "scoring_system": "epss", "scoring_elements": "0.92534", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4503" }, { "reference_url": "http://secunia.com/advisories/32163", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32163" }, { "reference_url": "http://secunia.com/advisories/32448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32448" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/32759", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32759" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45721" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://www.adobe.com/support/security/advisories/apsa08-08.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/advisories/apsa08-08.html" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/31625", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31625" }, { "reference_url": "http://www.securitytracker.com/id?1020996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020996" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2764", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2764" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=466344", "reference_id": "466344", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=466344" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0_r67:*:solaris:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4503", "reference_id": "CVE-2008-4503", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4503" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4503" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh21-ps74-wyaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41805?format=api", "vulnerability_id": "VCID-ujwj-eby4-xfg4", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5361.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5361", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8684", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86753", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86763", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86759", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86783", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86804", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86823", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5361" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://securityreason.com/securityalert/4692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4692" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html" }, { "reference_url": "http://www.isecpartners.com/advisories/2008-01-flash.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.isecpartners.com/advisories/2008-01-flash.txt" }, { "reference_url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618337", "reference_id": "1618337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5361", "reference_id": "CVE-2008-5361", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5361" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5361" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujwj-eby4-xfg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41806?format=api", "vulnerability_id": "VCID-yc7j-b5gb-jqe5", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8684", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86753", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.8675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86763", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86759", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86783", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86804", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03068", "scoring_system": "epss", "scoring_elements": "0.86823", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5362" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "http://securityreason.com/securityalert/4692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4692" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-22.html" }, { "reference_url": "http://www.isecpartners.com/advisories/2008-01-flash.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.isecpartners.com/advisories/2008-01-flash.txt" }, { "reference_url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/498561/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618338", "reference_id": "1618338", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618338" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5362", "reference_id": "CVE-2008-5362", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5362" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-5362" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yc7j-b5gb-jqe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41802?format=api", "vulnerability_id": "VCID-yzky-wqbj-2bh4", "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n arbitrary code execution on a user's system via a malicious Flash file.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4822.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95735", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95672", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.9568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95689", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95697", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.9571", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95713", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95727", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21364", "scoring_system": "epss", "scoring_elements": "0.95729", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4822" }, { "reference_url": "http://secunia.com/advisories/32702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32702" }, { "reference_url": "http://secunia.com/advisories/33179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33179" }, { "reference_url": "http://secunia.com/advisories/33390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33390" }, { "reference_url": "http://secunia.com/advisories/34226", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34226" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-23.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-23.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46535" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1" }, { "reference_url": "http://support.apple.com/kb/HT3338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3338" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm" }, { "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=" }, { "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-20.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html" }, { "reference_url": "http://www.securityfocus.com/bid/32129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32129" }, { "reference_url": "http://www.securitytracker.com/id?1021150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021150" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=470130", "reference_id": "470130", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470130" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4822", "reference_id": "CVE-2008-4822", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4822" }, { "reference_url": "https://security.gentoo.org/glsa/200903-23", "reference_id": "GLSA-200903-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945", "reference_id": "RHSA-2008:0945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980", "reference_id": "RHSA-2008:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0980" } ], "fixed_packages": [], "aliases": [ "CVE-2008-4822" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yzky-wqbj-2bh4" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@10.0.12.36-2%3Farch=el5" }