Lookup for vulnerable packages by Package URL.

GET /api/packages/117352?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/117352?format=api",
    "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.481-1?arch=el6_6",
    "type": "rpm",
    "namespace": "redhat",
    "name": "flash-plugin",
    "version": "11.2.202.481-1",
    "qualifiers": {
        "arch": "el6_6"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48399?format=api",
            "vulnerability_id": "VCID-2deq-knc5-gqgh",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3123.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3123.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3123"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3123"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2deq-knc5-gqgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48402?format=api",
            "vulnerability_id": "VCID-2zen-a9gk-gfe1",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3126.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3126.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77761",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77767",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77794",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77777",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77804",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7781",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77836",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77855",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77854",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77848",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7788",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77889",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77903",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77914",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77944",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3126"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zen-a9gk-gfe1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48409?format=api",
            "vulnerability_id": "VCID-413z-ffr5-ukah",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3133.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3133.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3133"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3133"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-413z-ffr5-ukah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48408?format=api",
            "vulnerability_id": "VCID-5k9t-ar4q-4ua6",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3132.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3132.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3132"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3132"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k9t-ar4q-4ua6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48422?format=api",
            "vulnerability_id": "VCID-7jmn-pcds-xucr",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5117.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5117.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5117"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-5117"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jmn-pcds-xucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48420?format=api",
            "vulnerability_id": "VCID-88t8-tbnx-qff7",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5116.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5116.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96103",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96117",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96122",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96133",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96136",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96139",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9614",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96149",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96153",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96157",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96158",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96165",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.24696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96172",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5116"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=354&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-5116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=354&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37851.txt",
                    "reference_id": "CVE-2015-5116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37851.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-5116"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88t8-tbnx-qff7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48419?format=api",
            "vulnerability_id": "VCID-8a1e-sc82-pba8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4433.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4433.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91246",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91256",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91287",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4433"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4433"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8a1e-sc82-pba8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48398?format=api",
            "vulnerability_id": "VCID-96q7-emff-t3bn",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3122.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3122.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91246",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91256",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91287",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3122"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3122"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96q7-emff-t3bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48412?format=api",
            "vulnerability_id": "VCID-9c6u-2evq-qbg1",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3136.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3136.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3136"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3136"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c6u-2evq-qbg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48390?format=api",
            "vulnerability_id": "VCID-9rt2-624p-c7eg",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3114.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3114.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62135",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62196",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62226",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62242",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62259",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62268",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62291",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62298",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62284",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62293",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6231",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62303",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62248",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3114"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3114"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9rt2-624p-c7eg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48413?format=api",
            "vulnerability_id": "VCID-dvba-b6af-kfcb",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3137.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3137.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98386",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9839",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98393",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3137"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=388&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3137",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=388&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37864.txt",
                    "reference_id": "CVE-2015-3137",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37864.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3137"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvba-b6af-kfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48401?format=api",
            "vulnerability_id": "VCID-ed2f-s7mg-33g6",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3125.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3125.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57523",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57604",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57658",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57676",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57656",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57635",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57661",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57598",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57617",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57596",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57552",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57597",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3125"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3125"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2f-s7mg-33g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48388?format=api",
            "vulnerability_id": "VCID-ekmk-cad5-ubg8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58313",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58399",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58419",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58392",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58445",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58462",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58467",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58444",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58405",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58418",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58403",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58367",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58409",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0578"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2014-0578"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ekmk-cad5-ubg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48392?format=api",
            "vulnerability_id": "VCID-ff7c-txvq-5udd",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3116.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3116.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57523",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57604",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57658",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57676",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57656",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57635",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57661",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57598",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57617",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57596",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57552",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57597",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3116"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3116"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ff7c-txvq-5udd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48417?format=api",
            "vulnerability_id": "VCID-fjuw-zsw4-vqdz",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4431.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4431.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4431"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4431"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjuw-zsw4-vqdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48403?format=api",
            "vulnerability_id": "VCID-fn1v-f3ba-ayhm",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3127.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3127.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3127"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3127"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fn1v-f3ba-ayhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48415?format=api",
            "vulnerability_id": "VCID-g2t3-6d1c-9ubh",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4429.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4429.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85001",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85046",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85045",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85041",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85062",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85064",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85086",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85095",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85093",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85108",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85133",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4429"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4429"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2t3-6d1c-9ubh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48418?format=api",
            "vulnerability_id": "VCID-h6wx-55np-d3bf",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4432.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4432.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4432",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98386",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9839",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98393",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4432"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=425&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-4432",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=425&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37879.txt",
                    "reference_id": "CVE-2015-4432",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37879.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4432"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h6wx-55np-d3bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48404?format=api",
            "vulnerability_id": "VCID-j56q-6cxx-7qgy",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3128.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3128.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9848",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98482",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98484",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98489",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9849",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98493",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98492",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98499",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.985",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98504",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98505",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98503",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98508",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.6551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98507",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3128"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=367&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3128",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=367&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37860.txt",
                    "reference_id": "CVE-2015-3128",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37860.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3128"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j56q-6cxx-7qgy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48424?format=api",
            "vulnerability_id": "VCID-jvdb-r35g-vuc5",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5119.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5119.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.9315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.998",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.9315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99801",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.93212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.93212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.93212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.998",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.93212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99801",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.93212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99802",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5119"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1032809",
                    "reference_id": "1032809",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1032809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240832",
                    "reference_id": "1240832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240832"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/561288",
                    "reference_id": "561288",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/561288"
                },
                {
                    "reference_url": "http://twitter.com/w3bd3vil/statuses/618168863708962816",
                    "reference_id": "618168863708962816",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://twitter.com/w3bd3vil/statuses/618168863708962816"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/75568",
                    "reference_id": "75568",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/75568"
                },
                {
                    "reference_url": "http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf",
                    "reference_id": "adobe_flash_hacking_team_uaf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf"
                },
                {
                    "reference_url": "https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html",
                    "reference_id": "Adobe-Flash-Player-ByteArray-Use-After-Free.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html"
                },
                {
                    "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsa15-03.html",
                    "reference_id": "apsa15-03.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "https://helpx.adobe.com/security/products/flash-player/apsa15-03.html"
                },
                {
                    "reference_url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html",
                    "reference_id": "apsb15-16.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37523.rb",
                    "reference_id": "CVE-2015-5119;OSVDB-124196",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37523.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html",
                    "reference_id": "msg00016.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html",
                    "reference_id": "RHSA-2015-1214.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/ncas/alerts/TA15-195A",
                    "reference_id": "TA15-195A",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://www.us-cert.gov/ncas/alerts/TA15-195A"
                },
                {
                    "reference_url": "http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/",
                    "reference_id": "unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-11-17T19:55:11Z/"
                        }
                    ],
                    "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-5119"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvdb-r35g-vuc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48405?format=api",
            "vulnerability_id": "VCID-n7e6-qrhf-uycv",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3129.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3129"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3129"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7e6-qrhf-uycv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48411?format=api",
            "vulnerability_id": "VCID-nvc3-559r-mqd1",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3135.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3135.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91151",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91156",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91172",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91186",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91192",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91225",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91227",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91237",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9125",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91267",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3135"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3135"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvc3-559r-mqd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48423?format=api",
            "vulnerability_id": "VCID-pant-33ku-c3hx",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98386",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9839",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98393",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5118"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=426&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-5118",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=426&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37880.txt",
                    "reference_id": "CVE-2015-5118",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37880.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-5118"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pant-33ku-c3hx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48397?format=api",
            "vulnerability_id": "VCID-qe1a-sc8j-byh7",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3121.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3121.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91246",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91256",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91287",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3121"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3121"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1a-sc8j-byh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48414?format=api",
            "vulnerability_id": "VCID-qkq1-3t6b-sucm",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4428.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4428.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4428",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4428"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4428"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq1-3t6b-sucm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48393?format=api",
            "vulnerability_id": "VCID-s4kg-14rv-8ufy",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3117.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3117.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3117"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3117"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4kg-14rv-8ufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48396?format=api",
            "vulnerability_id": "VCID-s9e9-hjcc-c7e2",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3120.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3120.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91863",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91871",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91886",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91904",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91903",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91922",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91919",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9192",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91927",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9194",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3120"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3120"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9e9-hjcc-c7e2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48410?format=api",
            "vulnerability_id": "VCID-tf7u-a1b4-53c2",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3134.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3134.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9824",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98243",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98246",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98251",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98252",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98255",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98261",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98262",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98264",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98265",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98266",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.59669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98271",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3134"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=378&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3134",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=378&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37862.txt",
                    "reference_id": "CVE-2015-3134",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37862.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3134"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tf7u-a1b4-53c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48416?format=api",
            "vulnerability_id": "VCID-vj2f-6v31-kfa9",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4430.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4430.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98386",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9839",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98393",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.62732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4430"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=410&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-4430",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=410&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37875.txt",
                    "reference_id": "CVE-2015-4430",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37875.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-4430"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vj2f-6v31-kfa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60792?format=api",
            "vulnerability_id": "VCID-wcqu-5pw7-3kfy",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9354",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93558",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9357",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93577",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93596",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93607",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93612",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9361",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93609",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93616",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.11426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93628",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5124"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201508-01",
                    "reference_id": "GLSA-201508-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201508-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-5124"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcqu-5pw7-3kfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48400?format=api",
            "vulnerability_id": "VCID-wjsc-cdw5-bugc",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98196",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98203",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98206",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98211",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98212",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9821",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98213",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98219",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.5847",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98218",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3124"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=349&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3124",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=349&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37849.txt",
                    "reference_id": "CVE-2015-3124",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37849.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3124"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjsc-cdw5-bugc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48406?format=api",
            "vulnerability_id": "VCID-x52h-syxb-f3en",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90292",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3130"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3130"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x52h-syxb-f3en"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48391?format=api",
            "vulnerability_id": "VCID-xcbs-j1e1-uuc5",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46298",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46307",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46363",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46358",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46369",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46426",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46423",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46349",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46361",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46309",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46214",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4628",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173",
                    "reference_id": "1241173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241173"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3115"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xcbs-j1e1-uuc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48395?format=api",
            "vulnerability_id": "VCID-xrsk-dcx1-1fgb",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3119.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3119.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91246",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91256",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91287",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3119"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3119"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrsk-dcx1-1fgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48394?format=api",
            "vulnerability_id": "VCID-zc47-t2g5-33b2",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98312",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98315",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98318",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98329",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98334",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98337",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98338",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98341",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.61463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9834",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3118"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=342&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3118",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=342&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37848.txt",
                    "reference_id": "CVE-2015-3118",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37848.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3118"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zc47-t2g5-33b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48407?format=api",
            "vulnerability_id": "VCID-zkge-fqqn-pkf7",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3131.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3131.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93245",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93248",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3131"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171",
                    "reference_id": "1241171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-13",
                    "reference_id": "GLSA-201507-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1214",
                    "reference_id": "RHSA-2015:1214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1214"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3131"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkge-fqqn-pkf7"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.481-1%3Farch=el6_6"
}