{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40020?format=json","vulnerability_id":"VCID-anqw-yy8h-jbep","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","aliases":[{"alias":"CVE-2008-1655"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75496?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@9.0.124.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@9.0.124.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129342?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129343?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/129341?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with?arch=oss","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with%3Farch=oss"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1655","reference_id":"","reference_type":"","scores":[{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.9639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96404","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.9641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96412","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96431","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96434","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96439","published_at":"2026-05-12T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-05-14T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-05-15T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96453","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1655"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440696","reference_id":"440696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440696"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.2","risk_score":0.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anqw-yy8h-jbep"}