Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-plugins/adobe-flash@11.2.202.548
Typeebuild
Namespacewww-plugins
Nameadobe-flash
Version11.2.202.548
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version11.2.202.559
Latest_non_vulnerable_version32.0.0.387
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1kpw-q6uy-nbaa
vulnerability_id VCID-1kpw-q6uy-nbaa
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7643
reference_id
reference_type
scores
0
value 0.05675
scoring_system epss
scoring_elements 0.9035
published_at 2026-04-01T12:55:00Z
1
value 0.05675
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-02T12:55:00Z
2
value 0.05675
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-04T12:55:00Z
3
value 0.05675
scoring_system epss
scoring_elements 0.90368
published_at 2026-04-07T12:55:00Z
4
value 0.05675
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-08T12:55:00Z
5
value 0.05675
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-09T12:55:00Z
6
value 0.05675
scoring_system epss
scoring_elements 0.90396
published_at 2026-04-12T12:55:00Z
7
value 0.05675
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7643
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7643
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kpw-q6uy-nbaa
1
url VCID-344h-2azz-bbbz
vulnerability_id VCID-344h-2azz-bbbz
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7632
reference_id
reference_type
scores
0
value 0.06986
scoring_system epss
scoring_elements 0.91408
published_at 2026-04-01T12:55:00Z
1
value 0.06986
scoring_system epss
scoring_elements 0.91414
published_at 2026-04-02T12:55:00Z
2
value 0.06986
scoring_system epss
scoring_elements 0.91423
published_at 2026-04-04T12:55:00Z
3
value 0.06986
scoring_system epss
scoring_elements 0.91431
published_at 2026-04-07T12:55:00Z
4
value 0.06986
scoring_system epss
scoring_elements 0.91443
published_at 2026-04-08T12:55:00Z
5
value 0.06986
scoring_system epss
scoring_elements 0.9145
published_at 2026-04-09T12:55:00Z
6
value 0.06986
scoring_system epss
scoring_elements 0.91456
published_at 2026-04-11T12:55:00Z
7
value 0.06986
scoring_system epss
scoring_elements 0.91459
published_at 2026-04-12T12:55:00Z
8
value 0.06986
scoring_system epss
scoring_elements 0.91457
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7632
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7632
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-344h-2azz-bbbz
2
url VCID-3uuq-gnyu-83cr
vulnerability_id VCID-3uuq-gnyu-83cr
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7653
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7653
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-561
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-561
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7653
reference_id CVE-2015-7653
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7653
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7653
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3uuq-gnyu-83cr
3
url VCID-44x6-2q2q-3kau
vulnerability_id VCID-44x6-2q2q-3kau
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8044
reference_id
reference_type
scores
0
value 0.73093
scoring_system epss
scoring_elements 0.98786
published_at 2026-04-13T12:55:00Z
1
value 0.73093
scoring_system epss
scoring_elements 0.98774
published_at 2026-04-01T12:55:00Z
2
value 0.73093
scoring_system epss
scoring_elements 0.98775
published_at 2026-04-02T12:55:00Z
3
value 0.73093
scoring_system epss
scoring_elements 0.98778
published_at 2026-04-04T12:55:00Z
4
value 0.73093
scoring_system epss
scoring_elements 0.98781
published_at 2026-04-09T12:55:00Z
5
value 0.73093
scoring_system epss
scoring_elements 0.98782
published_at 2026-04-08T12:55:00Z
6
value 0.73093
scoring_system epss
scoring_elements 0.98784
published_at 2026-04-11T12:55:00Z
7
value 0.73093
scoring_system epss
scoring_elements 0.98785
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8044
5
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
6
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
7
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
8
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
9
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
10
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8044
reference_id CVE-2015-8044
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8044
25
reference_url https://code.google.com/p/google-security-research/issues/detail?id=558
reference_id CVE-2015-8044;OSVDB-130014
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=558
26
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt
reference_id CVE-2015-8044;OSVDB-130014
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt
27
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
28
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
29
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-8044
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44x6-2q2q-3kau
4
url VCID-4rpe-vwnm-s3cj
vulnerability_id VCID-4rpe-vwnm-s3cj
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7630
reference_id
reference_type
scores
0
value 0.20928
scoring_system epss
scoring_elements 0.95598
published_at 2026-04-01T12:55:00Z
1
value 0.20928
scoring_system epss
scoring_elements 0.95607
published_at 2026-04-02T12:55:00Z
2
value 0.20928
scoring_system epss
scoring_elements 0.95612
published_at 2026-04-04T12:55:00Z
3
value 0.20928
scoring_system epss
scoring_elements 0.95614
published_at 2026-04-07T12:55:00Z
4
value 0.20928
scoring_system epss
scoring_elements 0.95623
published_at 2026-04-08T12:55:00Z
5
value 0.20928
scoring_system epss
scoring_elements 0.95626
published_at 2026-04-09T12:55:00Z
6
value 0.20928
scoring_system epss
scoring_elements 0.95632
published_at 2026-04-12T12:55:00Z
7
value 0.20928
scoring_system epss
scoring_elements 0.95634
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7630
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7630
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rpe-vwnm-s3cj
5
url VCID-4wyw-8dch-tfar
vulnerability_id VCID-4wyw-8dch-tfar
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7647
reference_id
reference_type
scores
0
value 0.56759
scoring_system epss
scoring_elements 0.98113
published_at 2026-04-01T12:55:00Z
1
value 0.56759
scoring_system epss
scoring_elements 0.98116
published_at 2026-04-02T12:55:00Z
2
value 0.56759
scoring_system epss
scoring_elements 0.98119
published_at 2026-04-04T12:55:00Z
3
value 0.56759
scoring_system epss
scoring_elements 0.98121
published_at 2026-04-07T12:55:00Z
4
value 0.56759
scoring_system epss
scoring_elements 0.98125
published_at 2026-04-08T12:55:00Z
5
value 0.56759
scoring_system epss
scoring_elements 0.98126
published_at 2026-04-09T12:55:00Z
6
value 0.56759
scoring_system epss
scoring_elements 0.9813
published_at 2026-04-12T12:55:00Z
7
value 0.56759
scoring_system epss
scoring_elements 0.98131
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7647
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
reference_id 1271966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
3
reference_url https://code.google.com/p/google-security-research/issues/detail?id=548
reference_id CVE-2015-7647;OSVDB-128982
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=548
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt
reference_id CVE-2015-7647;OSVDB-128982
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt
5
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
6
reference_url https://access.redhat.com/errata/RHSA-2015:1913
reference_id RHSA-2015:1913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1913
7
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7647
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wyw-8dch-tfar
6
url VCID-5f4q-4z37-2fbt
vulnerability_id VCID-5f4q-4z37-2fbt
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7654
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7654
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-560
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-560
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7654
reference_id CVE-2015-7654
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7654
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7654
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5f4q-4z37-2fbt
7
url VCID-5t78-yk43-d7bz
vulnerability_id VCID-5t78-yk43-d7bz
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7661
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7661
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-564
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-564
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7661
reference_id CVE-2015-7661
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7661
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7661
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5t78-yk43-d7bz
8
url VCID-6q8v-3jsd-1bdt
vulnerability_id VCID-6q8v-3jsd-1bdt
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7652
reference_id
reference_type
scores
0
value 0.56221
scoring_system epss
scoring_elements 0.98098
published_at 2026-04-07T12:55:00Z
1
value 0.56221
scoring_system epss
scoring_elements 0.98109
published_at 2026-04-13T12:55:00Z
2
value 0.56221
scoring_system epss
scoring_elements 0.98094
published_at 2026-04-02T12:55:00Z
3
value 0.56221
scoring_system epss
scoring_elements 0.98091
published_at 2026-04-01T12:55:00Z
4
value 0.56221
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-09T12:55:00Z
5
value 0.56221
scoring_system epss
scoring_elements 0.98108
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7652
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url https://www.exploit-db.com/exploits/39020/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39020/
7
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
8
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
9
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-557
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-557
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7652
reference_id CVE-2015-7652
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7652
24
reference_url https://code.google.com/p/google-security-research/issues/detail?id=559
reference_id CVE-2015-7652;OSVDB-130000
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=559
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt
reference_id CVE-2015-7652;OSVDB-130000
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt
26
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
27
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
28
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7652
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8v-3jsd-1bdt
9
url VCID-8g4x-e2kp-17ek
vulnerability_id VCID-8g4x-e2kp-17ek
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7660
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7660
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-565
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-565
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7660
reference_id CVE-2015-7660
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7660
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7660
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g4x-e2kp-17ek
10
url VCID-9n2y-4we5-kfdg
vulnerability_id VCID-9n2y-4we5-kfdg
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7648
reference_id
reference_type
scores
0
value 0.56759
scoring_system epss
scoring_elements 0.98113
published_at 2026-04-01T12:55:00Z
1
value 0.56759
scoring_system epss
scoring_elements 0.98116
published_at 2026-04-02T12:55:00Z
2
value 0.56759
scoring_system epss
scoring_elements 0.98119
published_at 2026-04-04T12:55:00Z
3
value 0.56759
scoring_system epss
scoring_elements 0.98121
published_at 2026-04-07T12:55:00Z
4
value 0.56759
scoring_system epss
scoring_elements 0.98125
published_at 2026-04-08T12:55:00Z
5
value 0.56759
scoring_system epss
scoring_elements 0.98126
published_at 2026-04-09T12:55:00Z
6
value 0.56759
scoring_system epss
scoring_elements 0.9813
published_at 2026-04-12T12:55:00Z
7
value 0.56759
scoring_system epss
scoring_elements 0.98131
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
reference_id 1271966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
3
reference_url https://code.google.com/p/google-security-research/issues/detail?id=545
reference_id CVE-2015-7648;OSVDB-128983
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=545
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt
reference_id CVE-2015-7648;OSVDB-128983
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt
5
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
6
reference_url https://access.redhat.com/errata/RHSA-2015:1913
reference_id RHSA-2015:1913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1913
7
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7648
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n2y-4we5-kfdg
11
url VCID-9y1j-q1ga-b7f4
vulnerability_id VCID-9y1j-q1ga-b7f4
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7625
reference_id
reference_type
scores
0
value 0.11151
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-01T12:55:00Z
1
value 0.11151
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-02T12:55:00Z
2
value 0.11151
scoring_system epss
scoring_elements 0.93463
published_at 2026-04-07T12:55:00Z
3
value 0.11151
scoring_system epss
scoring_elements 0.93471
published_at 2026-04-08T12:55:00Z
4
value 0.11151
scoring_system epss
scoring_elements 0.93475
published_at 2026-04-09T12:55:00Z
5
value 0.11151
scoring_system epss
scoring_elements 0.9348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7625
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7625
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y1j-q1ga-b7f4
12
url VCID-anh3-86vt-jycp
vulnerability_id VCID-anh3-86vt-jycp
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7633
reference_id
reference_type
scores
0
value 0.12412
scoring_system epss
scoring_elements 0.93857
published_at 2026-04-01T12:55:00Z
1
value 0.12412
scoring_system epss
scoring_elements 0.93866
published_at 2026-04-02T12:55:00Z
2
value 0.12412
scoring_system epss
scoring_elements 0.93875
published_at 2026-04-04T12:55:00Z
3
value 0.12412
scoring_system epss
scoring_elements 0.93878
published_at 2026-04-07T12:55:00Z
4
value 0.12412
scoring_system epss
scoring_elements 0.93887
published_at 2026-04-08T12:55:00Z
5
value 0.12412
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-09T12:55:00Z
6
value 0.12412
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7633
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7633
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anh3-86vt-jycp
13
url VCID-cawa-1fsq-c7hm
vulnerability_id VCID-cawa-1fsq-c7hm
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7646
reference_id CVE-2015-7646
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2015-7646
1
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7646
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cawa-1fsq-c7hm
14
url VCID-cfxj-dnwm-63g4
vulnerability_id VCID-cfxj-dnwm-63g4
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7656
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7656
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-558
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-558
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7656
reference_id CVE-2015-7656
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7656
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7656
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfxj-dnwm-63g4
15
url VCID-d2gk-avkh-hycs
vulnerability_id VCID-d2gk-avkh-hycs
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7628
reference_id
reference_type
scores
0
value 0.01385
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-01T12:55:00Z
1
value 0.01385
scoring_system epss
scoring_elements 0.80273
published_at 2026-04-02T12:55:00Z
2
value 0.01385
scoring_system epss
scoring_elements 0.80294
published_at 2026-04-04T12:55:00Z
3
value 0.01385
scoring_system epss
scoring_elements 0.80282
published_at 2026-04-07T12:55:00Z
4
value 0.01385
scoring_system epss
scoring_elements 0.80309
published_at 2026-04-08T12:55:00Z
5
value 0.01385
scoring_system epss
scoring_elements 0.8032
published_at 2026-04-09T12:55:00Z
6
value 0.01385
scoring_system epss
scoring_elements 0.80339
published_at 2026-04-11T12:55:00Z
7
value 0.01385
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-12T12:55:00Z
8
value 0.01385
scoring_system epss
scoring_elements 0.80318
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7628
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271388
reference_id 1271388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271388
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7628
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2gk-avkh-hycs
16
url VCID-f2u3-a67s-wqbx
vulnerability_id VCID-f2u3-a67s-wqbx
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7645
reference_id
reference_type
scores
0
value 0.85338
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-13T12:55:00Z
1
value 0.85338
scoring_system epss
scoring_elements 0.99357
published_at 2026-04-02T12:55:00Z
2
value 0.85338
scoring_system epss
scoring_elements 0.99363
published_at 2026-04-11T12:55:00Z
3
value 0.85338
scoring_system epss
scoring_elements 0.9936
published_at 2026-04-07T12:55:00Z
4
value 0.85338
scoring_system epss
scoring_elements 0.99359
published_at 2026-04-04T12:55:00Z
5
value 0.85338
scoring_system epss
scoring_elements 0.99362
published_at 2026-04-09T12:55:00Z
6
value 0.85338
scoring_system epss
scoring_elements 0.99361
published_at 2026-04-08T12:55:00Z
7
value 0.86649
scoring_system epss
scoring_elements 0.99415
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7645
2
reference_url http://www.securitytracker.com/id/1033850
reference_id 1033850
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://www.securitytracker.com/id/1033850
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
reference_id 1271966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271966
4
reference_url https://www.exploit-db.com/exploits/38490/
reference_id 38490
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url https://www.exploit-db.com/exploits/38490/
5
reference_url http://www.securityfocus.com/bid/77081
reference_id 77081
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://www.securityfocus.com/bid/77081
6
reference_url http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html
reference_id Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html
7
reference_url https://helpx.adobe.com/security/products/flash-player/apsa15-05.html
reference_id apsa15-05.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url https://helpx.adobe.com/security/products/flash-player/apsa15-05.html
8
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-27.html
reference_id apsb15-27.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url https://helpx.adobe.com/security/products/flash-player/apsb15-27.html
9
reference_url https://code.google.com/p/google-security-research/issues/detail?id=547
reference_id CVE-2015-7645;OSVDB-128853
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=547
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt
reference_id CVE-2015-7645;OSVDB-128853
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt
11
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url https://security.gentoo.org/glsa/201511-02
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
16
reference_url http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/
reference_id new-adobe-flash-zero-day-used-in-pawn-storm-campaign
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/
17
reference_url https://access.redhat.com/errata/RHSA-2015:1913
reference_id RHSA-2015:1913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1913
18
reference_url http://rhn.redhat.com/errata/RHSA-2015-1913.html
reference_id RHSA-2015-1913.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/
url http://rhn.redhat.com/errata/RHSA-2015-1913.html
19
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7645
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2u3-a67s-wqbx
17
url VCID-gd5j-9utg-jucm
vulnerability_id VCID-gd5j-9utg-jucm
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8042
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8042
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-563
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-563
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8042
reference_id CVE-2015-8042
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8042
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-8042
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gd5j-9utg-jucm
18
url VCID-guk8-qehq-9bgj
vulnerability_id VCID-guk8-qehq-9bgj
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7629
reference_id
reference_type
scores
0
value 0.19895
scoring_system epss
scoring_elements 0.9542
published_at 2026-04-01T12:55:00Z
1
value 0.19895
scoring_system epss
scoring_elements 0.95429
published_at 2026-04-02T12:55:00Z
2
value 0.19895
scoring_system epss
scoring_elements 0.95435
published_at 2026-04-04T12:55:00Z
3
value 0.19895
scoring_system epss
scoring_elements 0.95438
published_at 2026-04-07T12:55:00Z
4
value 0.19895
scoring_system epss
scoring_elements 0.95445
published_at 2026-04-08T12:55:00Z
5
value 0.19895
scoring_system epss
scoring_elements 0.95447
published_at 2026-04-09T12:55:00Z
6
value 0.19895
scoring_system epss
scoring_elements 0.95452
published_at 2026-04-12T12:55:00Z
7
value 0.19895
scoring_system epss
scoring_elements 0.95453
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7629
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7629
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-guk8-qehq-9bgj
19
url VCID-kes9-nw3n-2uam
vulnerability_id VCID-kes9-nw3n-2uam
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7659
reference_id
reference_type
scores
0
value 0.04646
scoring_system epss
scoring_elements 0.893
published_at 2026-04-13T12:55:00Z
1
value 0.04646
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-01T12:55:00Z
2
value 0.04646
scoring_system epss
scoring_elements 0.89259
published_at 2026-04-02T12:55:00Z
3
value 0.04646
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-04T12:55:00Z
4
value 0.04646
scoring_system epss
scoring_elements 0.89276
published_at 2026-04-07T12:55:00Z
5
value 0.04646
scoring_system epss
scoring_elements 0.89293
published_at 2026-04-08T12:55:00Z
6
value 0.04646
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-09T12:55:00Z
7
value 0.04646
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-11T12:55:00Z
8
value 0.04646
scoring_system epss
scoring_elements 0.89303
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7659
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77534
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77534
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-566
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-566
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7659
reference_id CVE-2015-7659
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7659
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7659
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kes9-nw3n-2uam
20
url VCID-kgxp-cj7j-gya2
vulnerability_id VCID-kgxp-cj7j-gya2
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7655
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7655
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-559
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-559
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7655
reference_id CVE-2015-7655
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7655
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7655
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgxp-cj7j-gya2
21
url VCID-kmny-8y8m-pqfx
vulnerability_id VCID-kmny-8y8m-pqfx
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7658
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7658
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-562
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-562
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7658
reference_id CVE-2015-7658
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7658
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7658
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kmny-8y8m-pqfx
22
url VCID-m3gd-vx7c-5uap
vulnerability_id VCID-m3gd-vx7c-5uap
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7634
reference_id
reference_type
scores
0
value 0.11151
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-01T12:55:00Z
1
value 0.11151
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-02T12:55:00Z
2
value 0.11151
scoring_system epss
scoring_elements 0.93463
published_at 2026-04-07T12:55:00Z
3
value 0.11151
scoring_system epss
scoring_elements 0.93471
published_at 2026-04-08T12:55:00Z
4
value 0.11151
scoring_system epss
scoring_elements 0.93475
published_at 2026-04-09T12:55:00Z
5
value 0.11151
scoring_system epss
scoring_elements 0.9348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7634
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7634
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3gd-vx7c-5uap
23
url VCID-mg2p-4k2h-kfax
vulnerability_id VCID-mg2p-4k2h-kfax
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7651
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7651
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
7
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
8
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
9
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-556
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-556
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7651
reference_id CVE-2015-7651
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7651
24
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
25
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
26
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7651
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg2p-4k2h-kfax
24
url VCID-ng4k-gfs2-83g3
vulnerability_id VCID-ng4k-gfs2-83g3
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7663
reference_id
reference_type
scores
0
value 0.1049
scoring_system epss
scoring_elements 0.93248
published_at 2026-04-13T12:55:00Z
1
value 0.1049
scoring_system epss
scoring_elements 0.9322
published_at 2026-04-01T12:55:00Z
2
value 0.1049
scoring_system epss
scoring_elements 0.93229
published_at 2026-04-02T12:55:00Z
3
value 0.1049
scoring_system epss
scoring_elements 0.93234
published_at 2026-04-04T12:55:00Z
4
value 0.1049
scoring_system epss
scoring_elements 0.93232
published_at 2026-04-07T12:55:00Z
5
value 0.1049
scoring_system epss
scoring_elements 0.93241
published_at 2026-04-08T12:55:00Z
6
value 0.1049
scoring_system epss
scoring_elements 0.93245
published_at 2026-04-09T12:55:00Z
7
value 0.1049
scoring_system epss
scoring_elements 0.93249
published_at 2026-04-11T12:55:00Z
8
value 0.1049
scoring_system epss
scoring_elements 0.93247
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7663
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7663
reference_id CVE-2015-7663
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7663
22
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
23
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
24
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7663
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-gfs2-83g3
25
url VCID-q8en-hn8w-6kgt
vulnerability_id VCID-q8en-hn8w-6kgt
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7662
reference_id
reference_type
scores
0
value 0.01794
scoring_system epss
scoring_elements 0.82757
published_at 2026-04-13T12:55:00Z
1
value 0.01794
scoring_system epss
scoring_elements 0.82693
published_at 2026-04-01T12:55:00Z
2
value 0.01794
scoring_system epss
scoring_elements 0.82709
published_at 2026-04-02T12:55:00Z
3
value 0.01794
scoring_system epss
scoring_elements 0.82722
published_at 2026-04-04T12:55:00Z
4
value 0.01794
scoring_system epss
scoring_elements 0.82719
published_at 2026-04-07T12:55:00Z
5
value 0.01794
scoring_system epss
scoring_elements 0.82744
published_at 2026-04-08T12:55:00Z
6
value 0.01794
scoring_system epss
scoring_elements 0.82751
published_at 2026-04-09T12:55:00Z
7
value 0.01794
scoring_system epss
scoring_elements 0.82767
published_at 2026-04-11T12:55:00Z
8
value 0.01794
scoring_system epss
scoring_elements 0.82762
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7662
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77535
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7662
reference_id CVE-2015-7662
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:C/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7662
22
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
23
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
24
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7662
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8en-hn8w-6kgt
26
url VCID-qmv1-y1sb-x3bs
vulnerability_id VCID-qmv1-y1sb-x3bs
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7644
reference_id
reference_type
scores
0
value 0.08652
scoring_system epss
scoring_elements 0.92411
published_at 2026-04-01T12:55:00Z
1
value 0.08652
scoring_system epss
scoring_elements 0.92417
published_at 2026-04-02T12:55:00Z
2
value 0.08652
scoring_system epss
scoring_elements 0.92426
published_at 2026-04-04T12:55:00Z
3
value 0.08652
scoring_system epss
scoring_elements 0.92429
published_at 2026-04-07T12:55:00Z
4
value 0.08652
scoring_system epss
scoring_elements 0.9244
published_at 2026-04-08T12:55:00Z
5
value 0.08652
scoring_system epss
scoring_elements 0.92445
published_at 2026-04-09T12:55:00Z
6
value 0.08652
scoring_system epss
scoring_elements 0.92451
published_at 2026-04-13T12:55:00Z
7
value 0.08652
scoring_system epss
scoring_elements 0.92453
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7644
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7644
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmv1-y1sb-x3bs
27
url VCID-qsh6-6x1b-7qdz
vulnerability_id VCID-qsh6-6x1b-7qdz
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7627
reference_id
reference_type
scores
0
value 0.11151
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-01T12:55:00Z
1
value 0.11151
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-02T12:55:00Z
2
value 0.11151
scoring_system epss
scoring_elements 0.93463
published_at 2026-04-07T12:55:00Z
3
value 0.11151
scoring_system epss
scoring_elements 0.93471
published_at 2026-04-08T12:55:00Z
4
value 0.11151
scoring_system epss
scoring_elements 0.93475
published_at 2026-04-09T12:55:00Z
5
value 0.11151
scoring_system epss
scoring_elements 0.9348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7627
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7627
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsh6-6x1b-7qdz
28
url VCID-r5dm-m1fk-hyab
vulnerability_id VCID-r5dm-m1fk-hyab
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7626
reference_id
reference_type
scores
0
value 0.11151
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-01T12:55:00Z
1
value 0.11151
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-02T12:55:00Z
2
value 0.11151
scoring_system epss
scoring_elements 0.93463
published_at 2026-04-07T12:55:00Z
3
value 0.11151
scoring_system epss
scoring_elements 0.93471
published_at 2026-04-08T12:55:00Z
4
value 0.11151
scoring_system epss
scoring_elements 0.93475
published_at 2026-04-09T12:55:00Z
5
value 0.11151
scoring_system epss
scoring_elements 0.9348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7626
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7626
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5dm-m1fk-hyab
29
url VCID-u56n-hm7p-vqhx
vulnerability_id VCID-u56n-hm7p-vqhx
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7631
reference_id
reference_type
scores
0
value 0.05675
scoring_system epss
scoring_elements 0.9035
published_at 2026-04-01T12:55:00Z
1
value 0.05675
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-02T12:55:00Z
2
value 0.05675
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-04T12:55:00Z
3
value 0.05675
scoring_system epss
scoring_elements 0.90368
published_at 2026-04-07T12:55:00Z
4
value 0.05675
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-08T12:55:00Z
5
value 0.05675
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-09T12:55:00Z
6
value 0.05675
scoring_system epss
scoring_elements 0.90396
published_at 2026-04-12T12:55:00Z
7
value 0.05675
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7631
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
reference_id 1271383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271383
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7631
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u56n-hm7p-vqhx
30
url VCID-vpdv-hn5q-nqa2
vulnerability_id VCID-vpdv-hn5q-nqa2
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8046
reference_id
reference_type
scores
0
value 0.6207
scoring_system epss
scoring_elements 0.98349
published_at 2026-04-13T12:55:00Z
1
value 0.6207
scoring_system epss
scoring_elements 0.98333
published_at 2026-04-01T12:55:00Z
2
value 0.6207
scoring_system epss
scoring_elements 0.98335
published_at 2026-04-02T12:55:00Z
3
value 0.6207
scoring_system epss
scoring_elements 0.98338
published_at 2026-04-04T12:55:00Z
4
value 0.6207
scoring_system epss
scoring_elements 0.9834
published_at 2026-04-07T12:55:00Z
5
value 0.6207
scoring_system epss
scoring_elements 0.98346
published_at 2026-04-09T12:55:00Z
6
value 0.6207
scoring_system epss
scoring_elements 0.98348
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8046
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url https://www.exploit-db.com/exploits/39019/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39019/
7
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
8
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8046
reference_id CVE-2015-8046
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8046
23
reference_url https://code.google.com/p/google-security-research/issues/detail?id=560
reference_id CVE-2015-8046;OSVDB-130015
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=560
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt
reference_id CVE-2015-8046;OSVDB-130015
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt
25
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
26
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
27
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-8046
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpdv-hn5q-nqa2
31
url VCID-w5pv-qzns-fyhz
vulnerability_id VCID-w5pv-qzns-fyhz
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7657
reference_id
reference_type
scores
0
value 0.0438
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-13T12:55:00Z
1
value 0.0438
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-01T12:55:00Z
2
value 0.0438
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-02T12:55:00Z
3
value 0.0438
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-04T12:55:00Z
4
value 0.0438
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-07T12:55:00Z
5
value 0.0438
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-08T12:55:00Z
6
value 0.0438
scoring_system epss
scoring_elements 0.88979
published_at 2026-04-09T12:55:00Z
7
value 0.0438
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-11T12:55:00Z
8
value 0.0438
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7657
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url http://www.zerodayinitiative.com/advisories/ZDI-15-567
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-15-567
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7657
reference_id CVE-2015-7657
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7657
23
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
24
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
25
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-7657
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5pv-qzns-fyhz
32
url VCID-ydut-vswf-cydm
vulnerability_id VCID-ydut-vswf-cydm
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2023.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2024.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2024.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8043
reference_id
reference_type
scores
0
value 0.66069
scoring_system epss
scoring_elements 0.98514
published_at 2026-04-13T12:55:00Z
1
value 0.66069
scoring_system epss
scoring_elements 0.98503
published_at 2026-04-01T12:55:00Z
2
value 0.66069
scoring_system epss
scoring_elements 0.98504
published_at 2026-04-02T12:55:00Z
3
value 0.66069
scoring_system epss
scoring_elements 0.98506
published_at 2026-04-04T12:55:00Z
4
value 0.66069
scoring_system epss
scoring_elements 0.98507
published_at 2026-04-07T12:55:00Z
5
value 0.66069
scoring_system epss
scoring_elements 0.9851
published_at 2026-04-08T12:55:00Z
6
value 0.66069
scoring_system epss
scoring_elements 0.98511
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8043
5
reference_url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
reference_id
reference_type
scores
url https://helpx.adobe.com/security/products/flash-player/apsb15-28.html
6
reference_url http://www.securityfocus.com/bid/77533
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77533
7
reference_url http://www.securitytracker.com/id/1034111
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034111
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
reference_id 1280062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1280062
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8043
reference_id CVE-2015-8043
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8043
22
reference_url https://code.google.com/p/google-security-research/issues/detail?id=557
reference_id CVE-2015-8043;OSVDB-130013
reference_type exploit
scores
url https://code.google.com/p/google-security-research/issues/detail?id=557
23
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt
reference_id CVE-2015-8043;OSVDB-130013
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt
24
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
25
reference_url https://access.redhat.com/errata/RHSA-2015:2023
reference_id RHSA-2015:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2023
26
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-8043
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydut-vswf-cydm
33
url VCID-yu4p-agr5-5ubn
vulnerability_id VCID-yu4p-agr5-5ubn
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5569
reference_id
reference_type
scores
0
value 0.06007
scoring_system epss
scoring_elements 0.90652
published_at 2026-04-01T12:55:00Z
1
value 0.06007
scoring_system epss
scoring_elements 0.90657
published_at 2026-04-02T12:55:00Z
2
value 0.06007
scoring_system epss
scoring_elements 0.90667
published_at 2026-04-04T12:55:00Z
3
value 0.06007
scoring_system epss
scoring_elements 0.90676
published_at 2026-04-07T12:55:00Z
4
value 0.06007
scoring_system epss
scoring_elements 0.90687
published_at 2026-04-08T12:55:00Z
5
value 0.06007
scoring_system epss
scoring_elements 0.90693
published_at 2026-04-09T12:55:00Z
6
value 0.06007
scoring_system epss
scoring_elements 0.90701
published_at 2026-04-11T12:55:00Z
7
value 0.06007
scoring_system epss
scoring_elements 0.90702
published_at 2026-04-12T12:55:00Z
8
value 0.06007
scoring_system epss
scoring_elements 0.90699
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5569
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271388
reference_id 1271388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271388
3
reference_url https://security.gentoo.org/glsa/201511-02
reference_id GLSA-201511-02
reference_type
scores
url https://security.gentoo.org/glsa/201511-02
4
reference_url https://access.redhat.com/errata/RHSA-2015:1893
reference_id RHSA-2015:1893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1893
5
reference_url https://access.redhat.com/errata/RHSA-2015:2024
reference_id RHSA-2015:2024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2024
fixed_packages
0
url pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
purl pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548
aliases CVE-2015-5569
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu4p-agr5-5ubn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548