{"url":"http://public2.vulnerablecode.io/api/packages/117272?format=json","purl":"pkg:rpm/redhat/flash-plugin@11.2.202.508-1?arch=el6_7","type":"rpm","namespace":"redhat","name":"flash-plugin","version":"11.2.202.508-1","qualifiers":{"arch":"el6_7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60794?format=json","vulnerability_id":"VCID-1821-4wne-4qht","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5127.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5127","reference_id":"","reference_type":"","scores":[{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.9794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97972","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5127"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=377&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5127","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=377&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37861.txt","reference_id":"CVE-2015-5127","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37861.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5127"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1821-4wne-4qht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60810?format=json","vulnerability_id":"VCID-1gq6-4hu1-dyg7","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5550.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5550","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5550"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=403&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5550","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=403&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37871.txt","reference_id":"CVE-2015-5550","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37871.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5550"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1gq6-4hu1-dyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60803?format=json","vulnerability_id":"VCID-4y1q-9k3b-ayfu","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5541","reference_id":"","reference_type":"","scores":[{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92824","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92851","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92857","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.9287","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0952","scoring_system":"epss","scoring_elements":"0.92883","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5541"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5541"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4y1q-9k3b-ayfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60802?format=json","vulnerability_id":"VCID-6vwz-15qc-uuag","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5540.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5540","reference_id":"","reference_type":"","scores":[{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97885","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97893","published_at":"2026-05-05T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97892","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5540"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=365&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5540","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=365&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37859.txt","reference_id":"CVE-2015-5540","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37859.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5540"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6vwz-15qc-uuag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60807?format=json","vulnerability_id":"VCID-7yd2-jnxr-nkgc","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5547","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5547"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=399&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5547","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=399&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37869.txt","reference_id":"CVE-2015-5547","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37869.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5547"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yd2-jnxr-nkgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60814?format=json","vulnerability_id":"VCID-8stg-w4ak-cqac","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5554.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5554","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5554"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=416&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5554","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=416&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37876.txt","reference_id":"CVE-2015-5554","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37876.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5554"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8stg-w4ak-cqac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60808?format=json","vulnerability_id":"VCID-9e8s-brd4-kkcu","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5548.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5548","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5548"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=400&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5548","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=400&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37870.txt","reference_id":"CVE-2015-5548","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37870.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5548"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9e8s-brd4-kkcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60818?format=json","vulnerability_id":"VCID-a9xw-xj4u-ykhe","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5558.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5558","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=422&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5558","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=422&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37878.txt","reference_id":"CVE-2015-5558","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37878.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5558"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9xw-xj4u-ykhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60800?format=json","vulnerability_id":"VCID-ap7h-z42q-f7ef","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5134.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5134","reference_id":"","reference_type":"","scores":[{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.9794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97972","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5134"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=355&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5134","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=355&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37852.txt","reference_id":"CVE-2015-5134","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37852.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5134"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ap7h-z42q-f7ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60824?format=json","vulnerability_id":"VCID-b85a-m7t6-wbgb","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5564.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5564","reference_id":"","reference_type":"","scores":[{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.8705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.8707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87077","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87115","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87142","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03237","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5564"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5564"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b85a-m7t6-wbgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60796?format=json","vulnerability_id":"VCID-bb2q-n39j-nqhr","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5130.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5130","reference_id":"","reference_type":"","scores":[{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.9794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.52984","scoring_system":"epss","scoring_elements":"0.97972","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5130"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=359&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5130","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=359&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37854.txt","reference_id":"CVE-2015-5130","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37854.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5130"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2q-n39j-nqhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60795?format=json","vulnerability_id":"VCID-bwad-7tvv-tkhy","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5129","reference_id":"","reference_type":"","scores":[{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86089","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86172","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86178","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86219","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5129"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5129"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwad-7tvv-tkhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60815?format=json","vulnerability_id":"VCID-chf4-yeu9-d7eq","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5555","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5555"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=409&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5555","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=409&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37874.txt","reference_id":"CVE-2015-5555","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37874.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5555"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chf4-yeu9-d7eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60819?format=json","vulnerability_id":"VCID-cmhh-gkd9-4ydd","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5559.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5559","reference_id":"","reference_type":"","scores":[{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.8807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88111","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88119","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.8812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88154","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.88166","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03819","scoring_system":"epss","scoring_elements":"0.8818","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5559"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5559"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmhh-gkd9-4ydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60822?format=json","vulnerability_id":"VCID-e7xw-p5hp-jyg7","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5562.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5562","reference_id":"","reference_type":"","scores":[{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.9818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.9819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98203","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=434&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5562","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=434&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/dos/37881.txt","reference_id":"CVE-2015-5562","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/dos/37881.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5562"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7xw-p5hp-jyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60817?format=json","vulnerability_id":"VCID-ecgg-8rq8-nyfk","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5557.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5557.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5557","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5557"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=418&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5557","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=418&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37877.txt","reference_id":"CVE-2015-5557","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37877.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5557"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecgg-8rq8-nyfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60816?format=json","vulnerability_id":"VCID-ets4-2uvp-9uc1","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5556.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5556","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5556"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=408&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5556","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=408&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37873.txt","reference_id":"CVE-2015-5556","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37873.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5556"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ets4-2uvp-9uc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60801?format=json","vulnerability_id":"VCID-ezsx-h3gb-67bc","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5539.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5539","reference_id":"","reference_type":"","scores":[{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97885","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97893","published_at":"2026-05-05T12:55:00Z"},{"value":"0.51159","scoring_system":"epss","scoring_elements":"0.97892","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5539"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=360&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5539","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=360&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37855.txt","reference_id":"CVE-2015-5539","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37855.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5539"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezsx-h3gb-67bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60798?format=json","vulnerability_id":"VCID-j253-du81-kydk","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5132","reference_id":"","reference_type":"","scores":[{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98742","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=362&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5132","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=362&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37857.txt","reference_id":"CVE-2015-5132","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37857.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5132"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j253-du81-kydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60823?format=json","vulnerability_id":"VCID-jckv-a8n4-xqh5","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5563.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5563.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5563","reference_id":"","reference_type":"","scores":[{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.9818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.9819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.5818","scoring_system":"epss","scoring_elements":"0.98203","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5563"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=484&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5563","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=484&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37884.txt","reference_id":"CVE-2015-5563","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37884.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5563"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jckv-a8n4-xqh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60820?format=json","vulnerability_id":"VCID-jmdq-g8zp-a3gn","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5560.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5560","reference_id":"","reference_type":"","scores":[{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97949","published_at":"2026-04-02T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97951","published_at":"2026-04-04T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.53139","scoring_system":"epss","scoring_elements":"0.97981","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5560"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=443&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5560","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=443&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37882.txt","reference_id":"CVE-2015-5560","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37882.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5560"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmdq-g8zp-a3gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85559?format=json","vulnerability_id":"VCID-kp2j-n39c-xudw","summary":"flash-plugin: multiple code execution flaws (APSB15-19)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5565.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5565","reference_id":"","reference_type":"","scores":[{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.8947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.8949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04804","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5565"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kp2j-n39c-xudw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60797?format=json","vulnerability_id":"VCID-njzk-bhzh-p7g4","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5131.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5131","reference_id":"","reference_type":"","scores":[{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98742","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5131"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=361&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5131","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=361&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37856.txt","reference_id":"CVE-2015-5131","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37856.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5131"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njzk-bhzh-p7g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60809?format=json","vulnerability_id":"VCID-pzgs-6q31-jfex","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5549.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5549","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=404&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5549","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=404&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37872.txt","reference_id":"CVE-2015-5549","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37872.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5549"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzgs-6q31-jfex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60812?format=json","vulnerability_id":"VCID-qw87-adba-z3dn","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5552.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5552","reference_id":"","reference_type":"","scores":[{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88835","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88851","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5552"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5552"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qw87-adba-z3dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60805?format=json","vulnerability_id":"VCID-sbch-tcn3-9bff","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5545.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5545","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5545"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=397&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5545","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=397&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37867.txt","reference_id":"CVE-2015-5545","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37867.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5545"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sbch-tcn3-9bff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85560?format=json","vulnerability_id":"VCID-tprj-3djs-8fcv","summary":"flash-plugin: multiple code execution flaws (APSB15-19)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5566.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5566","reference_id":"","reference_type":"","scores":[{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89469","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.8947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89518","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89531","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04803","scoring_system":"epss","scoring_elements":"0.89549","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5566"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tprj-3djs-8fcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60806?format=json","vulnerability_id":"VCID-umzu-u64u-x7ea","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5546.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5546","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5546"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=398&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5546","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=398&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37868.txt","reference_id":"CVE-2015-5546","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37868.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5546"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umzu-u64u-x7ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60821?format=json","vulnerability_id":"VCID-utt5-s83a-aqcx","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5561.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5561.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5561","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5561"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=444&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5561","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=444&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37883.txt","reference_id":"CVE-2015-5561","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37883.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5561"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-utt5-s83a-aqcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60799?format=json","vulnerability_id":"VCID-vzju-s4hg-27dn","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5133.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5133","reference_id":"","reference_type":"","scores":[{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.71451","scoring_system":"epss","scoring_elements":"0.98742","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5133"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=363&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5133","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=363&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37858.txt","reference_id":"CVE-2015-5133","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37858.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5133"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzju-s4hg-27dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60804?format=json","vulnerability_id":"VCID-w2ef-4rqb-bbbx","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5544.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5544","reference_id":"","reference_type":"","scores":[{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.9762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46078","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5544"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=396&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5544","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=396&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37866.txt","reference_id":"CVE-2015-5544","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37866.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5544"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ef-4rqb-bbbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60813?format=json","vulnerability_id":"VCID-w4ad-7b1u-vufr","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5553.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5553","reference_id":"","reference_type":"","scores":[{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.8882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88835","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04245","scoring_system":"epss","scoring_elements":"0.88851","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5553"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w4ad-7b1u-vufr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60811?format=json","vulnerability_id":"VCID-zts9-v5cv-9fh7","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5551.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5551","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5551"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=391&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5551","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=391&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37865.txt","reference_id":"CVE-2015-5551","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37865.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"fixed_packages":[],"aliases":["CVE-2015-5551"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zts9-v5cv-9fh7"}],"fixing_vulnerabilities":[],"risk_score":"1.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.508-1%3Farch=el6_7"}