{"url":"http://public2.vulnerablecode.io/api/packages/73677?format=json","purl":"pkg:ebuild/app-emulation/vmware-workstation@6.5.5.328052","type":"ebuild","namespace":"app-emulation","name":"vmware-workstation","version":"6.5.5.328052","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34290?format=json","vulnerability_id":"VCID-2a5v-kuuc-7uaa","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2267","reference_id":"","reference_type":"","scores":[{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02551","scoring_system":"epss","scoring_elements":"0.85586","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2267"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt","reference_id":"CVE-2009-2267;OSVDB-59441","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-2267"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5v-kuuc-7uaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34274?format=json","vulnerability_id":"VCID-2kj7-a6r9-bfft","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1806","reference_id":"","reference_type":"","scores":[{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88197","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.8817","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88183","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020238","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020238"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29640","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29640"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450768","reference_id":"450768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1806","reference_id":"CVE-2008-1806","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1806"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1806"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34261?format=json","vulnerability_id":"VCID-2nvs-t3tu-6qb5","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5269","reference_id":"","reference_type":"","scores":[{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.90194","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05422","scoring_system":"epss","scoring_elements":"0.9021","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92125","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5269"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=324771","reference_id":"324771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=324771"},{"reference_url":"https://security.gentoo.org/glsa/200711-08","reference_id":"GLSA-200711-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-08"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0992","reference_id":"RHSA-2007:0992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0992"},{"reference_url":"https://usn.ubuntu.com/538-1/","reference_id":"USN-538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/538-1/"},{"reference_url":"https://usn.ubuntu.com/730-1/","reference_id":"USN-730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/730-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5269"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nvs-t3tu-6qb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34268?format=json","vulnerability_id":"VCID-2yer-rsfy-h3c2","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1340","reference_id":"","reference_type":"","scores":[{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76311","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77834","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01077","scoring_system":"epss","scoring_elements":"0.77929","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1340"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1340"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2yer-rsfy-h3c2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34262?format=json","vulnerability_id":"VCID-63ya-au98-hkes","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5503","reference_id":"","reference_type":"","scores":[{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93203","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93242","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10388","scoring_system":"epss","scoring_elements":"0.93258","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5503"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=387431","reference_id":"387431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=387431"},{"reference_url":"https://security.gentoo.org/glsa/200712-04","reference_id":"GLSA-200712-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-04"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1078","reference_id":"RHSA-2007:1078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1078"},{"reference_url":"https://usn.ubuntu.com/550-1/","reference_id":"USN-550-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/550-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5503"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63ya-au98-hkes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34270?format=json","vulnerability_id":"VCID-7yq2-17us-5kdd","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1362","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10286","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10276","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10269","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10312","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1362"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1362"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yq2-17us-5kdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31420?format=json","vulnerability_id":"VCID-8fbf-8fea-27d9","summary":"Two vulnerabilities in dnsmasq might allow for a Denial of Service or\n    spoofing of DNS replies.","references":[{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"},{"reference_url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121630706004256&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=121866517322103&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=123324863916385&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=141879471518471&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0533.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447","reference_id":"","reference_type":"","scores":[{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99428","published_at":"2026-05-07T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86697","scoring_system":"epss","scoring_elements":"0.99425","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037","reference_id":"","reference_type":"","scores":[],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"},{"reference_url":"http://secunia.com/advisories/30925","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30925"},{"reference_url":"http://secunia.com/advisories/30973","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30973"},{"reference_url":"http://secunia.com/advisories/30977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30977"},{"reference_url":"http://secunia.com/advisories/30979","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30979"},{"reference_url":"http://secunia.com/advisories/30980","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30980"},{"reference_url":"http://secunia.com/advisories/30988","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30988"},{"reference_url":"http://secunia.com/advisories/30989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30989"},{"reference_url":"http://secunia.com/advisories/30998","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30998"},{"reference_url":"http://secunia.com/advisories/31011","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31011"},{"reference_url":"http://secunia.com/advisories/31012","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31012"},{"reference_url":"http://secunia.com/advisories/31014","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31014"},{"reference_url":"http://secunia.com/advisories/31019","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31019"},{"reference_url":"http://secunia.com/advisories/31022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31022"},{"reference_url":"http://secunia.com/advisories/31030","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31030"},{"reference_url":"http://secunia.com/advisories/31031","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31031"},{"reference_url":"http://secunia.com/advisories/31033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31033"},{"reference_url":"http://secunia.com/advisories/31052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31052"},{"reference_url":"http://secunia.com/advisories/31065","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31065"},{"reference_url":"http://secunia.com/advisories/31072","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31072"},{"reference_url":"http://secunia.com/advisories/31093","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31093"},{"reference_url":"http://secunia.com/advisories/31094","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31094"},{"reference_url":"http://secunia.com/advisories/31137","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31137"},{"reference_url":"http://secunia.com/advisories/31143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31143"},{"reference_url":"http://secunia.com/advisories/31151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31151"},{"reference_url":"http://secunia.com/advisories/31152","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31152"},{"reference_url":"http://secunia.com/advisories/31153","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31153"},{"reference_url":"http://secunia.com/advisories/31169","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31169"},{"reference_url":"http://secunia.com/advisories/31197","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31197"},{"reference_url":"http://secunia.com/advisories/31199","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31199"},{"reference_url":"http://secunia.com/advisories/31204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31204"},{"reference_url":"http://secunia.com/advisories/31207","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31207"},{"reference_url":"http://secunia.com/advisories/31209","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31209"},{"reference_url":"http://secunia.com/advisories/31212","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31212"},{"reference_url":"http://secunia.com/advisories/31213","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31213"},{"reference_url":"http://secunia.com/advisories/31221","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31221"},{"reference_url":"http://secunia.com/advisories/31236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31236"},{"reference_url":"http://secunia.com/advisories/31237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31237"},{"reference_url":"http://secunia.com/advisories/31254","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31254"},{"reference_url":"http://secunia.com/advisories/31326","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31326"},{"reference_url":"http://secunia.com/advisories/31354","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31354"},{"reference_url":"http://secunia.com/advisories/31422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31422"},{"reference_url":"http://secunia.com/advisories/31430","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31430"},{"reference_url":"http://secunia.com/advisories/31451","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31451"},{"reference_url":"http://secunia.com/advisories/31482","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31482"},{"reference_url":"http://secunia.com/advisories/31495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31495"},{"reference_url":"http://secunia.com/advisories/31588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31588"},{"reference_url":"http://secunia.com/advisories/31687","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31687"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31882","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31882"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33178","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33178"},{"reference_url":"http://secunia.com/advisories/33714","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33714"},{"reference_url":"http://secunia.com/advisories/33786","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33786"},{"reference_url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc","reference_id":"","reference_type":"","scores":[],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200807-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200807-08.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-17.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.citrix.com/article/CTX117991","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX117991"},{"reference_url":"http://support.citrix.com/article/CTX118183","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX118183"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"},{"reference_url":"https://www.exploit-db.com/exploits/6122","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6122"},{"reference_url":"https://www.exploit-db.com/exploits/6123","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6123"},{"reference_url":"https://www.exploit-db.com/exploits/6130","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6130"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"},{"reference_url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html","reference_id":"","reference_type":"","scores":[],"url":"http://up2date.astaro.com/2008/08/up2date_7202_released.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"},{"reference_url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning","reference_id":"","reference_type":"","scores":[],"url":"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"},{"reference_url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"},{"reference_url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"},{"reference_url":"http://www.debian.org/security/2008/dsa-1603","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1603"},{"reference_url":"http://www.debian.org/security/2008/dsa-1604","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1604"},{"reference_url":"http://www.debian.org/security/2008/dsa-1605","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1605"},{"reference_url":"http://www.debian.org/security/2008/dsa-1619","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1619"},{"reference_url":"http://www.debian.org/security/2008/dsa-1623","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1623"},{"reference_url":"http://www.doxpara.com/DMK_BO2K8.ppt","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/DMK_BO2K8.ppt"},{"reference_url":"http://www.doxpara.com/?p=1176","reference_id":"","reference_type":"","scores":[],"url":"http://www.doxpara.com/?p=1176"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672","reference_id":"","reference_type":"","scores":[],"url":"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"},{"reference_url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40","reference_id":"","reference_type":"","scores":[],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=40"},{"reference_url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.isc.org/index.pl?/sw/bind/bind-security.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/800113","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/800113"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"},{"reference_url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"},{"reference_url":"http://www.nominum.com/asset_upload_file741_2661.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.nominum.com/asset_upload_file741_2661.pdf"},{"reference_url":"http://www.novell.com/support/viewContent.do?externalId=7000912","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/support/viewContent.do?externalId=7000912"},{"reference_url":"http://www.openbsd.org/errata42.html#013_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata42.html#013_bind"},{"reference_url":"http://www.openbsd.org/errata43.html#004_bind","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata43.html#004_bind"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"},{"reference_url":"http://www.phys.uu.nl/~rombouts/pdnsd.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.phys.uu.nl/~rombouts/pdnsd.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0789.html"},{"reference_url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"},{"reference_url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/","reference_id":"","reference_type":"","scores":[],"url":"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"},{"reference_url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495289/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30131","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30131"},{"reference_url":"http://www.securitytracker.com/id?1020437","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020437"},{"reference_url":"http://www.securitytracker.com/id?1020438","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020438"},{"reference_url":"http://www.securitytracker.com/id?1020440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020440"},{"reference_url":"http://www.securitytracker.com/id?1020448","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020448"},{"reference_url":"http://www.securitytracker.com/id?1020449","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020449"},{"reference_url":"http://www.securitytracker.com/id?1020548","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020548"},{"reference_url":"http://www.securitytracker.com/id?1020558","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020558"},{"reference_url":"http://www.securitytracker.com/id?1020560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020560"},{"reference_url":"http://www.securitytracker.com/id?1020561","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020561"},{"reference_url":"http://www.securitytracker.com/id?1020575","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020575"},{"reference_url":"http://www.securitytracker.com/id?1020576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020576"},{"reference_url":"http://www.securitytracker.com/id?1020577","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020577"},{"reference_url":"http://www.securitytracker.com/id?1020578","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020578"},{"reference_url":"http://www.securitytracker.com/id?1020579","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020579"},{"reference_url":"http://www.securitytracker.com/id?1020651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020651"},{"reference_url":"http://www.securitytracker.com/id?1020653","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020653"},{"reference_url":"http://www.securitytracker.com/id?1020702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020702"},{"reference_url":"http://www.securitytracker.com/id?1020802","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020802"},{"reference_url":"http://www.securitytracker.com/id?1020804","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020804"},{"reference_url":"http://www.ubuntu.com/usn/usn-622-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-622-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-627-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-627-1"},{"reference_url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-190B.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-260A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2019/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2019/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2023/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2023/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2025/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2025/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2029/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2029/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2030/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2030/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2050/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2050/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2051/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2051/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2052/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2052/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2055/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2055/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2092/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2092/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2113/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2113/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2114/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2114/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2123/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2123/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2139/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2139/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2166/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2166/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2195/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2195/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2196/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2196/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2197/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2197/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2268","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2291","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2291"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2334","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2334"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2342","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2342"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2377","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2377"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2383","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2383"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2384","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2384"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2467","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2467"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2482","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2482"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2549","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2549"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2582"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2584","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2584"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0297"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0311","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0311"},{"reference_url":"http://www.vupen.com/english/advisories/2010/0622","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/0622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345","reference_id":"449345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=449345"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123","reference_id":"490123","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465","reference_id":"492465","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698","reference_id":"492698","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700","reference_id":"492700","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599","reference_id":"493599","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447","reference_id":"CVE-2008-1447","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1447"},{"reference_url":"https://security.gentoo.org/glsa/200807-08","reference_id":"GLSA-200807-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200807-08"},{"reference_url":"https://security.gentoo.org/glsa/200809-02","reference_id":"GLSA-200809-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200809-02"},{"reference_url":"https://security.gentoo.org/glsa/200812-17","reference_id":"GLSA-200812-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-17"},{"reference_url":"https://security.gentoo.org/glsa/200901-03","reference_id":"GLSA-200901-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-03"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c","reference_id":"OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0533","reference_id":"RHSA-2008:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0789","reference_id":"RHSA-2008:0789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0789"},{"reference_url":"https://usn.ubuntu.com/622-1/","reference_id":"USN-622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/622-1/"},{"reference_url":"https://usn.ubuntu.com/627-1/","reference_id":"USN-627-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/627-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1447"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34284?format=json","vulnerability_id":"VCID-9enb-qxzr-zka6","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://kb.vmware.com/kb/1006980","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1006980"},{"reference_url":"http://kb.vmware.com/kb/1006986","reference_id":"","reference_type":"","scores":[],"url":"http://kb.vmware.com/kb/1006986"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4917","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22221","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21989","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21881","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4917"},{"reference_url":"http://secunia.com/advisories/32965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32965"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1021300","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021300"},{"reference_url":"http://securitytracker.com/id?1021301","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021301"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246"},{"reference_url":"http://www.securityfocus.com/archive/1/498863/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498863/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/498886/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498886/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32597","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32597"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4917","reference_id":"CVE-2008-4917","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4917"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-4917"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9enb-qxzr-zka6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34294?format=json","vulnerability_id":"VCID-a1zy-wpsh-ybdq","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html"},{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html"},{"reference_url":"http://freetexthost.com/qr1tffkzpu","reference_id":"","reference_type":"","scores":[],"url":"http://freetexthost.com/qr1tffkzpu"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html"},{"reference_url":"http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html","reference_id":"","reference_type":"","scores":[],"url":"http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4811","reference_id":"","reference_type":"","scores":[{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79694","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79521","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79527","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.7957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.7964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79672","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4811"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://www.securityfocus.com/bid/36630","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/36630"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4811","reference_id":"CVE-2009-4811","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4811"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-4811"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1zy-wpsh-ybdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34299?format=json","vulnerability_id":"VCID-b7yt-1bj3-13bp","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1139","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22355","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22338","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1139"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1139"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7yt-1bj3-13bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34272?format=json","vulnerability_id":"VCID-bz18-eys5-rua3","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1364","reference_id":"","reference_type":"","scores":[{"value":"0.018","scoring_system":"epss","scoring_elements":"0.8272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-04-02T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.018","scoring_system":"epss","scoring_elements":"0.82786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83891","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83925","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83952","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83973","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1364"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1364"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bz18-eys5-rua3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34271?format=json","vulnerability_id":"VCID-d1tn-aydm-7ucp","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1363","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13412","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13378","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1333","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13297","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13097","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13251","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1363"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1363"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1tn-aydm-7ucp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34287?format=json","vulnerability_id":"VCID-dc32-wm2e-h7fj","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0910","reference_id":"","reference_type":"","scores":[{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89063","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.88951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.88959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.88975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89008","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.8902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89014","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89041","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04399","scoring_system":"epss","scoring_elements":"0.89048","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0910"},{"reference_url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786"},{"reference_url":"http://www.securityfocus.com/bid/34373","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34373"},{"reference_url":"http://www.securitytracker.com/id?1021974","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021974"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0944","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0944"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0910","reference_id":"CVE-2009-0910","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0910"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-0910"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dc32-wm2e-h7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34265?format=json","vulnerability_id":"VCID-e5gp-hpdc-nydk","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0967","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21656","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21849","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21587","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0967"},{"reference_url":"http://secunia.com/advisories/30556","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30556"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securityreason.com/securityalert/3922","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/3922"},{"reference_url":"http://securitytracker.com/id?1020198","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020198"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42878","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42878"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583"},{"reference_url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29557","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29557"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1744","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1744"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-0967","reference_id":"CVE-2008-0967","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-0967"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-0967"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5gp-hpdc-nydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34298?format=json","vulnerability_id":"VCID-eyg9-ezua-1kfz","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1138","reference_id":"","reference_type":"","scores":[{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73446","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73496","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73542","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73601","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1138"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1138"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eyg9-ezua-1kfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34301?format=json","vulnerability_id":"VCID-gdac-gvg7-m3e9","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1141","reference_id":"","reference_type":"","scores":[{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.9014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.9018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90219","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0545","scoring_system":"epss","scoring_elements":"0.90235","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1141"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1141"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gdac-gvg7-m3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34302?format=json","vulnerability_id":"VCID-ke4g-w7md-pkh6","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1142","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78066","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78182","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78241","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1142"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1142"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ke4g-w7md-pkh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34289?format=json","vulnerability_id":"VCID-kxd4-h9ev-1yby","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1244","reference_id":"","reference_type":"","scores":[{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70348","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70378","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00632","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1244"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-1244"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kxd4-h9ev-1yby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34303?format=json","vulnerability_id":"VCID-njd2-w4zv-h3er","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2010/000092.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2010/000092.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1143","reference_id":"","reference_type":"","scores":[{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.80989","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.80998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.8102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81059","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81052","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.8109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81088","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.8111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81118","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.81126","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0149","scoring_system":"epss","scoring_elements":"0.8114","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1143"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1023945","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1023945"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298"},{"reference_url":"http://www.securityfocus.com/bid/39949","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/39949"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2010-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2010-0008.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt","reference_id":"CVE-2010-1143","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1143","reference_id":"CVE-2010-1143","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1143"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt","reference_id":"CVE-2010-1143;OSVDB-64440","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt"},{"reference_url":"https://www.securityfocus.com/bid/39949/info","reference_id":"CVE-2010-1143;OSVDB-64440","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/39949/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1143"],"risk_score":7.8,"exploitability":"2.0","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njd2-w4zv-h3er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34285?format=json","vulnerability_id":"VCID-pw1x-gvns-bbcx","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt"},{"reference_url":"http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000062.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000062.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0040","reference_id":"","reference_type":"","scores":[{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92276","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92209","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92256","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92255","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08276","scoring_system":"epss","scoring_elements":"0.92261","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0040"},{"reference_url":"http://secunia.com/advisories/33970","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33970"},{"reference_url":"http://secunia.com/advisories/33976","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33976"},{"reference_url":"http://secunia.com/advisories/34137","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34137"},{"reference_url":"http://secunia.com/advisories/34140","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34140"},{"reference_url":"http://secunia.com/advisories/34143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34143"},{"reference_url":"http://secunia.com/advisories/34145","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34145"},{"reference_url":"http://secunia.com/advisories/34152","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34152"},{"reference_url":"http://secunia.com/advisories/34210","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34210"},{"reference_url":"http://secunia.com/advisories/34265","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34265"},{"reference_url":"http://secunia.com/advisories/34272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34272"},{"reference_url":"http://secunia.com/advisories/34320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34320"},{"reference_url":"http://secunia.com/advisories/34324","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34324"},{"reference_url":"http://secunia.com/advisories/34388","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34388"},{"reference_url":"http://secunia.com/advisories/34462","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34462"},{"reference_url":"http://secunia.com/advisories/34464","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34464"},{"reference_url":"http://secunia.com/advisories/35074","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35074"},{"reference_url":"http://secunia.com/advisories/35258","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35258"},{"reference_url":"http://secunia.com/advisories/35302","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35302"},{"reference_url":"http://secunia.com/advisories/35379","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35379"},{"reference_url":"http://secunia.com/advisories/35386","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35386"},{"reference_url":"http://secunia.com/advisories/36096","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/36096"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-28.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-28.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48819","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48819"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952"},{"reference_url":"http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"},{"reference_url":"http://support.apple.com/kb/HT3549","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3549"},{"reference_url":"http://support.apple.com/kb/HT3613","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3613"},{"reference_url":"http://support.apple.com/kb/HT3639","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3639"},{"reference_url":"http://support.apple.com/kb/HT3757","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3757"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"},{"reference_url":"http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2009-0046","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0046"},{"reference_url":"http://www.debian.org/security/2009/dsa-1750","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1750"},{"reference_url":"http://www.debian.org/security/2009/dsa-1830","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1830"},{"reference_url":"http://www.kb.cert.org/vuls/id/649212","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/649212"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:051","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:051"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:075","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:075"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:083","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:083"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0315.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0315.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0325.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0325.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0333.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0333.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0340.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0340.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501767/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501767/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/503912/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/503912/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/505990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/505990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33827","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33827"},{"reference_url":"http://www.securityfocus.com/bid/33990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33990"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-218A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA09-218A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0007.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0469","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0469"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0473","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0473"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0632","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0632"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1297"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1451","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1451"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1462","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1462"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1522","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1522"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1560","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1560"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1621","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1621"},{"reference_url":"http://www.vupen.com/english/advisories/2009/2172","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/2172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=486355","reference_id":"486355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=486355"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040","reference_id":"CVE-2009-0040","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0040","reference_id":"CVE-2009-0040","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0040"},{"reference_url":"https://security.gentoo.org/glsa/200903-28","reference_id":"GLSA-200903-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-28"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-10","reference_id":"mfsa2009-10","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0315","reference_id":"RHSA-2009:0315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0325","reference_id":"RHSA-2009:0325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0333","reference_id":"RHSA-2009:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0340","reference_id":"RHSA-2009:0340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0340"},{"reference_url":"https://usn.ubuntu.com/728-1/","reference_id":"USN-728-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/728-1/"},{"reference_url":"https://usn.ubuntu.com/730-1/","reference_id":"USN-730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/730-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0040"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw1x-gvns-bbcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34283?format=json","vulnerability_id":"VCID-q5ts-6ax2-bqgb","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4916","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11391","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11333","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11159","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4916"},{"reference_url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439"},{"reference_url":"http://www.securityfocus.com/bid/34373","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34373"},{"reference_url":"http://www.securitytracker.com/id?1021973","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021973"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0944","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0944"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4916","reference_id":"CVE-2008-4916","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4916"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-4916"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ts-6ax2-bqgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34286?format=json","vulnerability_id":"VCID-r2aq-6u1w-dubh","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000054.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0909","reference_id":"","reference_type":"","scores":[{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88292","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.8836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88377","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03944","scoring_system":"epss","scoring_elements":"0.88389","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0909"},{"reference_url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2009/Apr/0036.html"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251"},{"reference_url":"http://www.securityfocus.com/bid/34373","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34373"},{"reference_url":"http://www.securitytracker.com/id?1021974","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021974"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0005.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0944","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0944"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0909","reference_id":"CVE-2009-0909","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0909"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-0909"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r2aq-6u1w-dubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34269?format=json","vulnerability_id":"VCID-r4en-2px9-pkcw","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1361","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12334","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12273","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1361"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1361"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4en-2px9-pkcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34291?format=json","vulnerability_id":"VCID-r55y-rbsq-pkb9","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3707","reference_id":"","reference_type":"","scores":[{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.9569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95692","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95694","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95693","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95709","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21257","scoring_system":"epss","scoring_elements":"0.95711","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3707"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py","reference_id":"CVE-2009-3707;OSVDB-58728","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py"},{"reference_url":"https://www.securityfocus.com/bid/36630/info","reference_id":"CVE-2009-3707;OSVDB-58728","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/36630/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-3707"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r55y-rbsq-pkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34278?format=json","vulnerability_id":"VCID-rcck-xn4c-k3at","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1808","reference_id":"","reference_type":"","scores":[{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85732","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.8562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.8566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85711","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://secunia.com/advisories/35204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35204"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020240","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020240"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29637","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29637"},{"reference_url":"http://www.securityfocus.com/bid/29639","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29639"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450774","reference_id":"450774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1808","reference_id":"CVE-2008-1808","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1808"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0329","reference_id":"RHSA-2009:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0329"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1808"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34280?format=json","vulnerability_id":"VCID-rpue-d1na-gkaa","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2100","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36061","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35452","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2100"},{"reference_url":"http://secunia.com/advisories/30556","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30556"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securityreason.com/securityalert/3922","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/3922"},{"reference_url":"http://securitytracker.com/id?1020200","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020200"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42872","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42872"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647"},{"reference_url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29552","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29552"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1744","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1744"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2100","reference_id":"CVE-2008-2100","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2100"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-2100"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rpue-d1na-gkaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34300?format=json","vulnerability_id":"VCID-rzpn-qmzx-w3gt","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1140","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25419","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25253","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25319","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1140"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1140"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzpn-qmzx-w3gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34293?format=json","vulnerability_id":"VCID-sz64-mgub-abf2","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3733","reference_id":"","reference_type":"","scores":[{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.9958","published_at":"2026-04-01T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99589","published_at":"2026-04-29T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99591","published_at":"2026-05-05T12:55:00Z"},{"value":"0.9006","scoring_system":"epss","scoring_elements":"0.99593","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3733"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse","reference_id":"CVE-2009-3733;OSVDB-59440","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse"},{"reference_url":"https://www.securityfocus.com/bid/36842/info","reference_id":"CVE-2009-3733;OSVDB-59440","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/36842/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-3733"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sz64-mgub-abf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34273?format=json","vulnerability_id":"VCID-tawd-pjmt-ukag","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1392","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75056","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75111","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75138","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1392"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-1392"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tawd-pjmt-ukag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34276?format=json","vulnerability_id":"VCID-txkg-jsdf-93e6","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1807","reference_id":"","reference_type":"","scores":[{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90112","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90062","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.9006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90071","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020239","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020239"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29641","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29641"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450773","reference_id":"450773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1807","reference_id":"CVE-2008-1807","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1807"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[],"aliases":["CVE-2008-1807"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34279?format=json","vulnerability_id":"VCID-uw16-r5d8-nfbu","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2098","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27674","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27063","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27128","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2098"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-2098"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uw16-r5d8-nfbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34297?format=json","vulnerability_id":"VCID-wknw-5jfy-c3dh","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1137","reference_id":"","reference_type":"","scores":[{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71766","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71792","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71825","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.7183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71819","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71852","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1137"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2010-1137"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wknw-5jfy-c3dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34292?format=json","vulnerability_id":"VCID-x226-fmea-gqhh","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3732","reference_id":"","reference_type":"","scores":[{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96677","published_at":"2026-04-21T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.96687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30069","scoring_system":"epss","scoring_elements":"0.9669","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3732"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt","reference_id":"CVE-2009-3732;OSVDB-63605","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2009-3732"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x226-fmea-gqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34281?format=json","vulnerability_id":"VCID-xscf-xy4a-huce","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2101","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18937","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1922","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19255","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18975","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18854","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2101"},{"reference_url":"http://secunia.com/advisories/31713","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31713"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securityreason.com/securityalert/4202","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/4202"},{"reference_url":"http://securitytracker.com/id?1020794","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020794"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44797","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44797"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30937","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30937"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2101","reference_id":"CVE-2008-2101","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2101"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-2101"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xscf-xy4a-huce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34263?format=json","vulnerability_id":"VCID-xwej-smtp-sfef","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5671","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29908","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30462","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30271","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30323","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30228","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30047","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29837","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5671"},{"reference_url":"http://secunia.com/advisories/30556","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30556"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securityreason.com/securityalert/3922","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/3922"},{"reference_url":"http://securitytracker.com/id?1020197","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020197"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688"},{"reference_url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493080/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493148/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493148/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/493172/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493172/100/0/threaded"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1744","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1744"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5671","reference_id":"CVE-2007-5671","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5671"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2007-5671"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwej-smtp-sfef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34304?format=json","vulnerability_id":"VCID-y97g-phmz-rubu","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3868","reference_id":"","reference_type":"","scores":[{"value":"0.1931","scoring_system":"epss","scoring_elements":"0.95334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1931","scoring_system":"epss","scoring_elements":"0.95343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1931","scoring_system":"epss","scoring_elements":"0.95349","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1931","scoring_system":"epss","scoring_elements":"0.95354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95808","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95828","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95849","published_at":"2026-05-05T12:55:00Z"},{"value":"0.22333","scoring_system":"epss","scoring_elements":"0.95851","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3868"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2011-3868"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y97g-phmz-rubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34282?format=json","vulnerability_id":"VCID-z8f9-7v4h-5kfw","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2008/000042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2008/000042.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4915","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21931","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22116","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21977","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21951","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21858","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4915"},{"reference_url":"http://secunia.com/advisories/32612","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32612"},{"reference_url":"http://secunia.com/advisories/32624","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32624"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46415","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46415"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309"},{"reference_url":"http://www.securityfocus.com/archive/1/498138/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/498138/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32168","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32168"},{"reference_url":"http://www.securitytracker.com/id?1021154","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021154"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0018.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0018.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3052","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3052"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4915","reference_id":"CVE-2008-4915","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4915"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"}],"fixed_packages":[],"aliases":["CVE-2008-4915"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8f9-7v4h-5kfw"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-workstation@6.5.5.328052"}