Lookup for vulnerable packages by Package URL.

GET /api/packages/117939?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/117939?format=api",
    "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.466-1?arch=el5",
    "type": "rpm",
    "namespace": "redhat",
    "name": "flash-plugin",
    "version": "11.2.202.466-1",
    "qualifiers": {
        "arch": "el5"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47864?format=api",
            "vulnerability_id": "VCID-4n54-r9e2-syd8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3102"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3102"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4n54-r9e2-syd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47865?format=api",
            "vulnerability_id": "VCID-582a-u4qz-ckek",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83204",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83267",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83273",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83309",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8331",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83311",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83335",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83342",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83348",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3103"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3103"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-582a-u4qz-ckek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47856?format=api",
            "vulnerability_id": "VCID-6cbr-s2ey-jfcb",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62018",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62077",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62078",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62146",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62154",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62133",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62183",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62195",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62189",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62182",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3096"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230185",
                    "reference_id": "1230185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230185"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3096"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cbr-s2ey-jfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47867?format=api",
            "vulnerability_id": "VCID-9exz-cbxm-u3ap",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99594",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99597",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.996",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99602",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99604",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3105"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb",
                    "reference_id": "CVE-2015-3105;OSVDB-123023",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3105"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9exz-cbxm-u3ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47861?format=api",
            "vulnerability_id": "VCID-ds3j-m8vm-vqbx",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3100.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3100.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87353",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87363",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87379",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87378",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87396",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87403",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8741",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87406",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87421",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87418",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87441",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87455",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8747",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3100"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3100"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3j-m8vm-vqbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47869?format=api",
            "vulnerability_id": "VCID-dzn9-3wfw-7yem",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3107.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3107.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97839",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97844",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97846",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9786",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97862",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97869",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9787",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97868",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97867",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97871",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97875",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97874",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3107"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=352&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3107",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=352&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37850.txt",
                    "reference_id": "CVE-2015-3107",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37850.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201508-01",
                    "reference_id": "GLSA-201508-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201508-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3107"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzn9-3wfw-7yem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47858?format=api",
            "vulnerability_id": "VCID-em98-jbgn-47h8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3098.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3098.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3098"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3098"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-em98-jbgn-47h8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47868?format=api",
            "vulnerability_id": "VCID-ersd-m7fc-hfbq",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3106.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3106.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98019",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98022",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98027",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98039",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98037",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98036",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98041",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98049",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98047",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3106"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=330&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3106;OSVDB-123024",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=330&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37847.txt",
                    "reference_id": "CVE-2015-3106;OSVDB-123024",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37847.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3106"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ersd-m7fc-hfbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47859?format=api",
            "vulnerability_id": "VCID-rvmf-rwu6-73d3",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3099.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3099.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3099"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3099"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvmf-rwu6-73d3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47870?format=api",
            "vulnerability_id": "VCID-x76v-rr7b-5bee",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63278",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63307",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63323",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63342",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63359",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63343",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63348",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63346",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63329",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63374",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3108"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230201",
                    "reference_id": "1230201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230201"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3108"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x76v-rr7b-5bee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47866?format=api",
            "vulnerability_id": "VCID-y1kc-4ku3-wbbv",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3104.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3104.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89048",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89108",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89104",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89102",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89116",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8913",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89137",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89141",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89149",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89165",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3104"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3104"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1kc-4ku3-wbbv"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "1.6",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.466-1%3Farch=el5"
}