Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/74248?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "type": "ebuild", "namespace": "www-plugins", "name": "adobe-flash", "version": "11.2.202.548", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "11.2.202.559", "latest_non_vulnerable_version": "32.0.0.387", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35903?format=api", "vulnerability_id": "VCID-1kpw-q6uy-nbaa", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.9035", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90353", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90368", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90389", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7643" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7643" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1kpw-q6uy-nbaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35900?format=api", "vulnerability_id": "VCID-344h-2azz-bbbz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91408", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91423", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.9145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91459", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06986", "scoring_system": "epss", "scoring_elements": "0.91457", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7632" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7632" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-344h-2azz-bbbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35911?format=api", "vulnerability_id": "VCID-3uuq-gnyu-83cr", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7653" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-561", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-561" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7653", "reference_id": "CVE-2015-7653", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7653" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7653" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3uuq-gnyu-83cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35929?format=api", "vulnerability_id": "VCID-44x6-2q2q-3kau", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98786", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98778", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98781", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98784", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73093", "scoring_system": "epss", "scoring_elements": "0.98785", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8044" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8044", "reference_id": "CVE-2015-8044", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8044" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=558", "reference_id": "CVE-2015-8044;OSVDB-130014", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=558" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt", "reference_id": "CVE-2015-8044;OSVDB-130014", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-8044" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44x6-2q2q-3kau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35896?format=api", "vulnerability_id": "VCID-4rpe-vwnm-s3cj", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20928", "scoring_system": "epss", "scoring_elements": "0.95634", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7630" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7630" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rpe-vwnm-s3cj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35907?format=api", "vulnerability_id": "VCID-4wyw-8dch-tfar", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98113", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.9813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98131", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7647" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966", "reference_id": "1271966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=548", "reference_id": "CVE-2015-7647;OSVDB-128982", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=548" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt", "reference_id": "CVE-2015-7647;OSVDB-128982", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1913", "reference_id": "RHSA-2015:1913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7647" ], "risk_score": 1.0, "exploitability": "2.0", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wyw-8dch-tfar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35912?format=api", "vulnerability_id": "VCID-5f4q-4z37-2fbt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7654" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-560", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-560" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7654", "reference_id": "CVE-2015-7654", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7654" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7654" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5f4q-4z37-2fbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35924?format=api", "vulnerability_id": "VCID-5t78-yk43-d7bz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7661" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-564" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7661", "reference_id": "CVE-2015-7661", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7661" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7661" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t78-yk43-d7bz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35910?format=api", "vulnerability_id": "VCID-6q8v-3jsd-1bdt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.56221", "scoring_system": "epss", "scoring_elements": "0.98108", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7652" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "https://www.exploit-db.com/exploits/39020/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39020/" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-557", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-557" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7652", "reference_id": "CVE-2015-7652", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7652" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=559", "reference_id": "CVE-2015-7652;OSVDB-130000", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=559" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt", "reference_id": "CVE-2015-7652;OSVDB-130000", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7652" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8v-3jsd-1bdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35922?format=api", "vulnerability_id": "VCID-8g4x-e2kp-17ek", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7660" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-565" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7660", "reference_id": "CVE-2015-7660", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7660" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7660" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g4x-e2kp-17ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35908?format=api", "vulnerability_id": "VCID-9n2y-4we5-kfdg", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98113", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.9813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.56759", "scoring_system": "epss", "scoring_elements": "0.98131", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7648" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966", "reference_id": "1271966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=545", "reference_id": "CVE-2015-7648;OSVDB-128983", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=545" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt", "reference_id": "CVE-2015-7648;OSVDB-128983", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1913", "reference_id": "RHSA-2015:1913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7648" ], "risk_score": 1.0, "exploitability": "2.0", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9n2y-4we5-kfdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35891?format=api", "vulnerability_id": "VCID-9y1j-q1ga-b7f4", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93455", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.9348", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7625" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7625" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9y1j-q1ga-b7f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35901?format=api", "vulnerability_id": "VCID-anh3-86vt-jycp", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93857", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93891", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12412", "scoring_system": "epss", "scoring_elements": "0.93895", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7633" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7633" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anh3-86vt-jycp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35906?format=api", "vulnerability_id": "VCID-cawa-1fsq-c7hm", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7646", "reference_id": "CVE-2015-7646", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7646" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7646" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cawa-1fsq-c7hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35914?format=api", "vulnerability_id": "VCID-cfxj-dnwm-63g4", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7656" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7656", "reference_id": "CVE-2015-7656", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7656" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7656" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfxj-dnwm-63g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35894?format=api", "vulnerability_id": "VCID-d2gk-avkh-hycs", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80265", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80282", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80309", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.8032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80339", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80318", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7628" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271388", "reference_id": "1271388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271388" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7628" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d2gk-avkh-hycs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35905?format=api", "vulnerability_id": "VCID-f2u3-a67s-wqbx", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99357", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.9936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.85338", "scoring_system": "epss", "scoring_elements": "0.99361", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86649", "scoring_system": "epss", "scoring_elements": "0.99415", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7645" }, { "reference_url": "http://www.securitytracker.com/id/1033850", "reference_id": "1033850", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://www.securitytracker.com/id/1033850" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966", "reference_id": "1271966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271966" }, { "reference_url": "https://www.exploit-db.com/exploits/38490/", "reference_id": "38490", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "https://www.exploit-db.com/exploits/38490/" }, { "reference_url": "http://www.securityfocus.com/bid/77081", "reference_id": "77081", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://www.securityfocus.com/bid/77081" }, { "reference_url": "http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html", "reference_id": "Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsa15-05.html", "reference_id": "apsa15-05.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "https://helpx.adobe.com/security/products/flash-player/apsa15-05.html" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-27.html", "reference_id": "apsb15-27.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-27.html" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=547", "reference_id": "CVE-2015-7645;OSVDB-128853", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=547" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt", "reference_id": "CVE-2015-7645;OSVDB-128853", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html", "reference_id": "msg00018.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" }, { "reference_url": "http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/", "reference_id": "new-adobe-flash-zero-day-used-in-pawn-storm-campaign", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1913", "reference_id": "RHSA-2015:1913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1913" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1913.html", "reference_id": "RHSA-2015-1913.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1913.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7645" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2u3-a67s-wqbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35927?format=api", "vulnerability_id": "VCID-gd5j-9utg-jucm", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8042" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-563", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8042", "reference_id": "CVE-2015-8042", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8042" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-8042" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gd5j-9utg-jucm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35895?format=api", "vulnerability_id": "VCID-guk8-qehq-9bgj", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.9542", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95445", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95447", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19895", "scoring_system": "epss", "scoring_elements": "0.95453", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7629" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7629" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-guk8-qehq-9bgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35917?format=api", "vulnerability_id": "VCID-kes9-nw3n-2uam", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89276", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89298", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04646", "scoring_system": "epss", "scoring_elements": "0.89303", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7659" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77534" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-566", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-566" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7659", "reference_id": "CVE-2015-7659", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7659" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7659" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kes9-nw3n-2uam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35913?format=api", "vulnerability_id": "VCID-kgxp-cj7j-gya2", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7655" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-559", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-559" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7655", "reference_id": "CVE-2015-7655", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7655" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7655" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgxp-cj7j-gya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35916?format=api", "vulnerability_id": "VCID-kmny-8y8m-pqfx", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7658" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7658", "reference_id": "CVE-2015-7658", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7658" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7658" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmny-8y8m-pqfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35902?format=api", "vulnerability_id": "VCID-m3gd-vx7c-5uap", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93455", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.9348", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7634" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7634" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3gd-vx7c-5uap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35909?format=api", "vulnerability_id": "VCID-mg2p-4k2h-kfax", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7651" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-556" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7651", "reference_id": "CVE-2015-7651", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7651" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7651" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg2p-4k2h-kfax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35926?format=api", "vulnerability_id": "VCID-ng4k-gfs2-83g3", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.9322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93232", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1049", "scoring_system": "epss", "scoring_elements": "0.93247", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7663" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7663", "reference_id": "CVE-2015-7663", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7663" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7663" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-gfs2-83g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35925?format=api", "vulnerability_id": "VCID-q8en-hn8w-6kgt", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82693", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01794", "scoring_system": "epss", "scoring_elements": "0.82762", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7662" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77535" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7662", "reference_id": "CVE-2015-7662", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7662" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7662" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8en-hn8w-6kgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35904?format=api", "vulnerability_id": "VCID-qmv1-y1sb-x3bs", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7644", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.9244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08652", "scoring_system": "epss", "scoring_elements": "0.92453", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7644" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7644" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmv1-y1sb-x3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35893?format=api", "vulnerability_id": "VCID-qsh6-6x1b-7qdz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93455", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.9348", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7627" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7627" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qsh6-6x1b-7qdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35892?format=api", "vulnerability_id": "VCID-r5dm-m1fk-hyab", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93455", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.93475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11151", "scoring_system": "epss", "scoring_elements": "0.9348", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7626" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7626" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5dm-m1fk-hyab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35898?format=api", "vulnerability_id": "VCID-u56n-hm7p-vqhx", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.9035", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90353", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90368", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90389", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.90396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05675", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7631" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383", "reference_id": "1271383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271383" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7631" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u56n-hm7p-vqhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35930?format=api", "vulnerability_id": "VCID-vpdv-hn5q-nqa2", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98333", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98338", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.9834", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.6207", "scoring_system": "epss", "scoring_elements": "0.98348", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8046" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "https://www.exploit-db.com/exploits/39019/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39019/" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8046", "reference_id": "CVE-2015-8046", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8046" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=560", "reference_id": "CVE-2015-8046;OSVDB-130015", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=560" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt", "reference_id": "CVE-2015-8046;OSVDB-130015", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-8046" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpdv-hn5q-nqa2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35915?format=api", "vulnerability_id": "VCID-w5pv-qzns-fyhz", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0438", "scoring_system": "epss", "scoring_elements": "0.88985", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7657" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-15-567", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-567" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7657", "reference_id": "CVE-2015-7657", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7657" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-7657" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5pv-qzns-fyhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35928?format=api", "vulnerability_id": "VCID-ydut-vswf-cydm", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2023.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2024.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.9851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.66069", "scoring_system": "epss", "scoring_elements": "0.98511", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8043" }, { "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/77533", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/77533" }, { "reference_url": "http://www.securitytracker.com/id/1034111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062", "reference_id": "1280062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1280062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8043", "reference_id": "CVE-2015-8043", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8043" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=557", "reference_id": "CVE-2015-8043;OSVDB-130013", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=557" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt", "reference_id": "CVE-2015-8043;OSVDB-130013", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2023", "reference_id": "RHSA-2015:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-8043" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydut-vswf-cydm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35890?format=api", "vulnerability_id": "VCID-yu4p-agr5-5ubn", "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n worst of which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90652", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90676", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90687", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90701", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06007", "scoring_system": "epss", "scoring_elements": "0.90699", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5569" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271388", "reference_id": "1271388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271388" }, { "reference_url": "https://security.gentoo.org/glsa/201511-02", "reference_id": "GLSA-201511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1893", "reference_id": "RHSA-2015:1893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2024", "reference_id": "RHSA-2015:2024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2024" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74248?format=api", "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.548", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" } ], "aliases": [ "CVE-2015-5569" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yu4p-agr5-5ubn" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548" }