{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:31:02.473","vulnerabilities":[{"cve":{"id":"CVE-2009-0519","sourceIdentifier":"cve@mitre.org","published":"2009-02-26T16:17:19.877","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a crafted Shockwave Flash (aka .swf) file."},{"lang":"es","value":"Vulnerabilidad no especificada en Adobe Flash Player 9.x anteriores a v9.0.159.0 y v10.x anteriores a v10.0.22.87, permiten a atacantes remotos provocar una denegación de servicio (caída del navegador) o posiblemente ejecutar código de su elección a través de un fichero Shockwave Flash (también conocido como .swf)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*","matchCriteriaId":"15DDE65E-ED35-42B6-A139-BB6F571B5967"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"10.0.12.36","matchCriteriaId":"67971799-2A4E-4FD2-BF8B-5E0B82032E55"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*","matchCriteriaId":"DDFF4A51-C936-4C5B-8276-FD454C9E4F40"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D5ECC9D7-3386-4FEA-9218-91E31FF90F3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*","matchCriteriaId":"F0E93289-6EE0-401A-958D-F59D2CDAE2F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*","matchCriteriaId":"0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*","matchCriteriaId":"C00E5438-DBD7-4A47-8E5F-0D3946EA3102"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*","matchCriteriaId":"A82D5B56-44E0-4120-B73E-0A1155AF4B05"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*","matchCriteriaId":"8E895107-ED8A-4F88-87C3-935EAE299C01"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*","matchCriteriaId":"4007D621-A0BC-4927-82A7-10D73802BCF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"641776AE-5408-439E-8290-DD9324771874"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*","matchCriteriaId":"138A932A-D775-46A2-86EC-3C03C96884C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*","matchCriteriaId":"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*","matchCriteriaId":"F648661E-BA18-41F9-A0A7-F9D5D7E2056B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*","matchCriteriaId":"A88BDD68-3EDD-49F4-B656-EB03BF849664"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*","matchCriteriaId":"32912721-F750-4C20-B999-E728F7D3A85D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*","matchCriteriaId":"A95FA639-346C-491C-81A8-6C2A7B01AA19"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*","matchCriteriaId":"C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*","matchCriteriaId":"FC7DD938-F963-4E03-B66B-F00436E4EA9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*","matchCriteriaId":"F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*","matchCriteriaId":"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*","matchCriteriaId":"934A869D-D58D-4C36-B86E-013F62790585"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*","matchCriteriaId":"ACFA6611-99DA-48B0-89F7-DD99B8E30334"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*","matchCriteriaId":"59AF804B-BD7A-4AD7-AD44-B5D980443B8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*","matchCriteriaId":"0557AA2A-FA3A-460A-8F03-DC74B149CA3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*","matchCriteriaId":"2FC04ABF-6191-4AA5-90B2-E7A97E6C6005"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*","matchCriteriaId":"F22F1B02-CCF5-4770-A79B-1F58CA4321CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*","matchCriteriaId":"93957171-F1F4-43ED-A8B9-2D36C81EB1F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*","matchCriteriaId":"7AE89894-E492-4380-8A2B-4CDD3A15667A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*","matchCriteriaId":"1C6ED706-BAF2-4795-B597-6F7EE8CA8911"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*","matchCriteriaId":"260E2CF6-4D15-4168-A933-3EC52D8F93FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*","matchCriteriaId":"D50BF190-2629-49A8-A377-4723C93FFB3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*","matchCriteriaId":"08E4028B-72E7-4E4A-AD0F-645F5AACAA29"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*","matchCriteriaId":"63313ADA-3C52-47C8-9745-6BF6AEF0F6AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:cs3:*:pro:*:*:*:*:*","matchCriteriaId":"A3618623-8C9F-47CA-BBF6-B0DA98CB41FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:cs4:*:pro:*:*:*:*:*","matchCriteriaId":"9E1093EF-0A76-4757-9D8D-6808A5D95C86"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*","versionEndIncluding":"10.0.15.3","matchCriteriaId":"A72D07B5-1311-4653-8E84-7414E11A797C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flex:3.0:*:*:*:*:*:*:*","matchCriteriaId":"54D250C7-E7DE-491C-9FE3-F9F77C971B24"}]}]}],"references":[{"url":"http://isc.sans.org/diary.html?storyid=5929","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","source":"cve@mitre.org"},{"url":"http://rhn.redhat.com/errata/RHSA-2009-0332.html","source":"cve@mitre.org"},{"url":"http://rhn.redhat.com/errata/RHSA-2009-0334.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34012","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/34226","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/34293","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/35074","source":"cve@mitre.org"},{"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1","source":"cve@mitre.org"},{"url":"http://support.apple.com/kb/HT3549","source":"cve@mitre.org"},{"url":"http://www.adobe.com/support/security/bulletins/apsb09-01.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33890","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/0513","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/0743","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2009/1297","source":"cve@mitre.org"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487141","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48900","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15837","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6470","source":"cve@mitre.org"},{"url":"http://isc.sans.org/diary.html?storyid=5929","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2009-0332.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2009-0334.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34012","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/34226","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34293","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/35074","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-200903-23.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT3549","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.adobe.com/support/security/bulletins/apsb09-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33890","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/0513","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/0743","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2009/1297","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487141","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48900","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15837","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6470","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}