{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T00:37:13.970","vulnerabilities":[{"cve":{"id":"CVE-2008-4819","sourceIdentifier":"cve@mitre.org","published":"2008-11-10T14:12:55.747","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Adobe Flash Player 9.0.124.0 and earlier makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors."},{"lang":"es","value":"Vulnerabilidad no específica en Adobe Flash Player v9.0.124.0 y anteriores, facilitan a atacantes remotos conducir ataques de revinvulación DNS, mediante vectores desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0.124.0","matchCriteriaId":"CE43678F-7BFF-43EF-8968-B440E2BEF76F"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","matchCriteriaId":"A82D5B56-44E0-4120-B73E-0A1155AF4B05"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","matchCriteriaId":"FC7DD938-F963-4E03-B66B-F00436E4EA9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*","matchCriteriaId":"B2A0777F-22C2-4FD5-BE81-8982BE6874D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","matchCriteriaId":"F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*","matchCriteriaId":"5A37EB65-9EDD-41B0-ABEB-8A00232D8770"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*","matchCriteriaId":"600DDA9D-6440-48D1-8539-7127398A8678"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","matchCriteriaId":"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","matchCriteriaId":"934A869D-D58D-4C36-B86E-013F62790585"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","matchCriteriaId":"ACFA6611-99DA-48B0-89F7-DD99B8E30334"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","matchCriteriaId":"59AF804B-BD7A-4AD7-AD44-B5D980443B8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*","matchCriteriaId":"91A2A8EA-455E-4E26-8D4A-56925A42F559"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*","matchCriteriaId":"F5D52F86-2E38-4C66-9939-7603367B8D0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","matchCriteriaId":"0557AA2A-FA3A-460A-8F03-DC74B149CA3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","matchCriteriaId":"2FC04ABF-6191-4AA5-90B2-E7A97E6C6005"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","matchCriteriaId":"F22F1B02-CCF5-4770-A79B-1F58CA4321CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","matchCriteriaId":"93957171-F1F4-43ED-A8B9-2D36C81EB1F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","matchCriteriaId":"7AE89894-E492-4380-8A2B-4CDD3A15667A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","matchCriteriaId":"1C6ED706-BAF2-4795-B597-6F7EE8CA8911"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","matchCriteriaId":"260E2CF6-4D15-4168-A933-3EC52D8F93FF"}]}]}],"references":[{"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/32702","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33179","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33390","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34226","source":"cve@mitre.org"},{"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","source":"cve@mitre.org"},{"url":"http://support.apple.com/kb/HT3338","source":"cve@mitre.org"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","source":"cve@mitre.org"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","source":"cve@mitre.org"},{"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","source":"cve@mitre.org"},{"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/32129","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1021147","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/3444","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46532","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/32702","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/33179","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/33390","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34226","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT3338","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.adobe.com/support/security/bulletins/apsb08-20.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0980.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/32129","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1021147","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-350A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/3444","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46532","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}