Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/116724?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/116724?format=api", "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.548-1?arch=el6_7", "type": "rpm", "namespace": "redhat", "name": "flash-plugin", "version": "11.2.202.548-1", "qualifiers": { "arch": "el6_7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35911?format=api", "vulnerability_id": "VCID-3uuq-gnyu-83cr", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7653" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-561", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-561" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7653", "reference_id": "CVE-2015-7653", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7653" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7653" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3uuq-gnyu-83cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35929?format=api", "vulnerability_id": "VCID-44x6-2q2q-3kau", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98797", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98778", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98781", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98784", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98786", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.9879", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98791", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98796", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8044" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8044", "reference_id": "CVE-2015-8044", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8044" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=558", "reference_id": "CVE-2015-8044;OSVDB-130014", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=558" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt", "reference_id": "CVE-2015-8044;OSVDB-130014", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8044" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44x6-2q2q-3kau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35912?format=api", "vulnerability_id": "VCID-5f4q-4z37-2fbt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7654" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-560", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-560" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7654", "reference_id": "CVE-2015-7654", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7654" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7654" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5f4q-4z37-2fbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35924?format=api", "vulnerability_id": "VCID-5t78-yk43-d7bz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7661" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-564" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7661", "reference_id": "CVE-2015-7661", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7661" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7661" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t78-yk43-d7bz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35910?format=api", "vulnerability_id": "VCID-6q8v-3jsd-1bdt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98113", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98115", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98117", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7652" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "https://www.exploit-db.com/exploits/39020/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39020/" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-557", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-557" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7652", "reference_id": "CVE-2015-7652", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7652" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=559", "reference_id": "CVE-2015-7652;OSVDB-130000", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=559" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt", "reference_id": "CVE-2015-7652;OSVDB-130000", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7652" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8v-3jsd-1bdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35922?format=api", "vulnerability_id": "VCID-8g4x-e2kp-17ek", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7660" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-565" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7660", "reference_id": "CVE-2015-7660", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7660" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7660" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g4x-e2kp-17ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35914?format=api", "vulnerability_id": "VCID-cfxj-dnwm-63g4", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7656" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7656", "reference_id": "CVE-2015-7656", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7656" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7656" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfxj-dnwm-63g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35927?format=api", "vulnerability_id": "VCID-gd5j-9utg-jucm", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8042" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-563", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8042", "reference_id": "CVE-2015-8042", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8042" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8042" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gd5j-9utg-jucm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35917?format=api", "vulnerability_id": "VCID-kes9-nw3n-2uam", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.8933", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89276", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89298", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89314", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89313", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89308", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89325", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7659" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77534" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-566", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-566" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7659", "reference_id": "CVE-2015-7659", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7659" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7659" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kes9-nw3n-2uam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35913?format=api", "vulnerability_id": "VCID-kgxp-cj7j-gya2", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7655" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-559", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-559" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7655", "reference_id": "CVE-2015-7655", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7655" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7655" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgxp-cj7j-gya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35916?format=api", "vulnerability_id": "VCID-kmny-8y8m-pqfx", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7658" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7658", "reference_id": "CVE-2015-7658", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7658" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7658" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmny-8y8m-pqfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35909?format=api", "vulnerability_id": "VCID-mg2p-4k2h-kfax", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7651" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7651", "reference_id": "CVE-2015-7651", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7651" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7651" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg2p-4k2h-kfax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35926?format=api", "vulnerability_id": "VCID-ng4k-gfs2-83g3", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.9328", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.9322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93232", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93265", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.9327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93277", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93283", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7663" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7663", "reference_id": "CVE-2015-7663", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7663" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7663" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-gfs2-83g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35925?format=api", "vulnerability_id": "VCID-q8en-hn8w-6kgt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.8283", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82693", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82796", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82821", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7662" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77535" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7662", "reference_id": "CVE-2015-7662", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7662" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7662" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8en-hn8w-6kgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35930?format=api", "vulnerability_id": "VCID-vpdv-hn5q-nqa2", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98333", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98338", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.9834", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98353", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98351", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.9835", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98355", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8046" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "https://www.exploit-db.com/exploits/39019/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39019/" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8046", "reference_id": "CVE-2015-8046", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8046" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=560", "reference_id": "CVE-2015-8046;OSVDB-130015", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=560" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt", "reference_id": "CVE-2015-8046;OSVDB-130015", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8046" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpdv-hn5q-nqa2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35915?format=api", "vulnerability_id": "VCID-w5pv-qzns-fyhz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7657" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-567", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-567" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7657", "reference_id": "CVE-2015-7657", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7657" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-7657" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5pv-qzns-fyhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35928?format=api", "vulnerability_id": "VCID-ydut-vswf-cydm", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98528", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.9851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.9852", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98521", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98522", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98527", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8043" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8043", "reference_id": "CVE-2015-8043", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8043" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=557", "reference_id": "CVE-2015-8043;OSVDB-130013", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=557" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt", "reference_id": "CVE-2015-8043;OSVDB-130013", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8043" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydut-vswf-cydm" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.548-1%3Farch=el6_7" }