{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","type":"ebuild","namespace":"www-plugins","name":"adobe-flash","version":"11.2.202.548","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"11.2.202.559","latest_non_vulnerable_version":"32.0.0.387","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35903?format=json","vulnerability_id":"VCID-1kpw-q6uy-nbaa","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7643","reference_id":"","reference_type":"","scores":[{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.9035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90389","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7643"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7643"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kpw-q6uy-nbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35900?format=json","vulnerability_id":"VCID-344h-2azz-bbbz","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7632","reference_id":"","reference_type":"","scores":[{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91408","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91414","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.9145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91459","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06986","scoring_system":"epss","scoring_elements":"0.91457","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7632"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-344h-2azz-bbbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35911?format=json","vulnerability_id":"VCID-3uuq-gnyu-83cr","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7653","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7653"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-561","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-561"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7653","reference_id":"CVE-2015-7653","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7653"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7653"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3uuq-gnyu-83cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35929?format=json","vulnerability_id":"VCID-44x6-2q2q-3kau","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8044","reference_id":"","reference_type":"","scores":[{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98775","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98781","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98784","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73093","scoring_system":"epss","scoring_elements":"0.98785","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8044"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8044","reference_id":"CVE-2015-8044","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8044"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=558","reference_id":"CVE-2015-8044;OSVDB-130014","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=558"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt","reference_id":"CVE-2015-8044;OSVDB-130014","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39021.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-8044"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44x6-2q2q-3kau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35896?format=json","vulnerability_id":"VCID-4rpe-vwnm-s3cj","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7630","reference_id":"","reference_type":"","scores":[{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95626","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20928","scoring_system":"epss","scoring_elements":"0.95634","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7630"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rpe-vwnm-s3cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35907?format=json","vulnerability_id":"VCID-4wyw-8dch-tfar","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7647","reference_id":"","reference_type":"","scores":[{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.9813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98131","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7647"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966","reference_id":"1271966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=548","reference_id":"CVE-2015-7647;OSVDB-128982","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=548"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt","reference_id":"CVE-2015-7647;OSVDB-128982","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38969.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1913","reference_id":"RHSA-2015:1913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7647"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wyw-8dch-tfar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35912?format=json","vulnerability_id":"VCID-5f4q-4z37-2fbt","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7654","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7654"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-560","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-560"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7654","reference_id":"CVE-2015-7654","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7654"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7654"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5f4q-4z37-2fbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35924?format=json","vulnerability_id":"VCID-5t78-yk43-d7bz","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7661","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7661"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-564","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-564"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7661","reference_id":"CVE-2015-7661","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7661"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7661"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5t78-yk43-d7bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35910?format=json","vulnerability_id":"VCID-6q8v-3jsd-1bdt","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7652","reference_id":"","reference_type":"","scores":[{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98109","published_at":"2026-04-13T12:55:00Z"},{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.56221","scoring_system":"epss","scoring_elements":"0.98108","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7652"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"https://www.exploit-db.com/exploits/39020/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39020/"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-557","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-557"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7652","reference_id":"CVE-2015-7652","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7652"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=559","reference_id":"CVE-2015-7652;OSVDB-130000","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=559"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt","reference_id":"CVE-2015-7652;OSVDB-130000","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39020.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7652"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q8v-3jsd-1bdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35922?format=json","vulnerability_id":"VCID-8g4x-e2kp-17ek","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7660","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7660"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-565","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7660","reference_id":"CVE-2015-7660","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7660"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7660"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8g4x-e2kp-17ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35908?format=json","vulnerability_id":"VCID-9n2y-4we5-kfdg","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7648","reference_id":"","reference_type":"","scores":[{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.9813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.56759","scoring_system":"epss","scoring_elements":"0.98131","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966","reference_id":"1271966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=545","reference_id":"CVE-2015-7648;OSVDB-128983","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=545"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt","reference_id":"CVE-2015-7648;OSVDB-128983","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38970.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1913","reference_id":"RHSA-2015:1913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7648"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n2y-4we5-kfdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35891?format=json","vulnerability_id":"VCID-9y1j-q1ga-b7f4","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7625","reference_id":"","reference_type":"","scores":[{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.9348","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7625"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7625"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y1j-q1ga-b7f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35901?format=json","vulnerability_id":"VCID-anh3-86vt-jycp","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7633","reference_id":"","reference_type":"","scores":[{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93891","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12412","scoring_system":"epss","scoring_elements":"0.93895","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7633"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7633"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anh3-86vt-jycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35906?format=json","vulnerability_id":"VCID-cawa-1fsq-c7hm","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7646","reference_id":"CVE-2015-7646","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7646"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7646"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cawa-1fsq-c7hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35914?format=json","vulnerability_id":"VCID-cfxj-dnwm-63g4","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7656","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7656"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-558","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7656","reference_id":"CVE-2015-7656","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7656"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7656"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfxj-dnwm-63g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35894?format=json","vulnerability_id":"VCID-d2gk-avkh-hycs","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7628","reference_id":"","reference_type":"","scores":[{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8032","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80318","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271388","reference_id":"1271388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271388"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7628"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d2gk-avkh-hycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35905?format=json","vulnerability_id":"VCID-f2u3-a67s-wqbx","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7645","reference_id":"","reference_type":"","scores":[{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.9936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.85338","scoring_system":"epss","scoring_elements":"0.99361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86649","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7645"},{"reference_url":"http://www.securitytracker.com/id/1033850","reference_id":"1033850","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://www.securitytracker.com/id/1033850"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966","reference_id":"1271966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271966"},{"reference_url":"https://www.exploit-db.com/exploits/38490/","reference_id":"38490","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"https://www.exploit-db.com/exploits/38490/"},{"reference_url":"http://www.securityfocus.com/bid/77081","reference_id":"77081","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://www.securityfocus.com/bid/77081"},{"reference_url":"http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html","reference_id":"Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.html"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsa15-05.html","reference_id":"apsa15-05.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"https://helpx.adobe.com/security/products/flash-player/apsa15-05.html"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-27.html","reference_id":"apsb15-27.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-27.html"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=547","reference_id":"CVE-2015-7645;OSVDB-128853","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=547"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt","reference_id":"CVE-2015-7645;OSVDB-128853","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38490.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"},{"reference_url":"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/","reference_id":"new-adobe-flash-zero-day-used-in-pawn-storm-campaign","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1913","reference_id":"RHSA-2015:1913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1913"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1913.html","reference_id":"RHSA-2015-1913.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T21:39:00Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1913.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7645"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2u3-a67s-wqbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35927?format=json","vulnerability_id":"VCID-gd5j-9utg-jucm","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8042","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8042"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-563","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-563"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8042","reference_id":"CVE-2015-8042","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8042"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-8042"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gd5j-9utg-jucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35895?format=json","vulnerability_id":"VCID-guk8-qehq-9bgj","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7629","reference_id":"","reference_type":"","scores":[{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.9542","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95438","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95445","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95447","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19895","scoring_system":"epss","scoring_elements":"0.95453","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7629"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7629"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-guk8-qehq-9bgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35917?format=json","vulnerability_id":"VCID-kes9-nw3n-2uam","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7659","reference_id":"","reference_type":"","scores":[{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89253","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04646","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7659"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77534","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77534"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-566","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7659","reference_id":"CVE-2015-7659","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7659"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7659"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kes9-nw3n-2uam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35913?format=json","vulnerability_id":"VCID-kgxp-cj7j-gya2","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7655","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7655"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-559","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-559"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7655","reference_id":"CVE-2015-7655","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7655"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7655"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kgxp-cj7j-gya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35916?format=json","vulnerability_id":"VCID-kmny-8y8m-pqfx","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7658","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7658"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-562","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7658","reference_id":"CVE-2015-7658","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7658"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7658"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kmny-8y8m-pqfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35902?format=json","vulnerability_id":"VCID-m3gd-vx7c-5uap","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7634","reference_id":"","reference_type":"","scores":[{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.9348","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7634"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7634"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3gd-vx7c-5uap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35909?format=json","vulnerability_id":"VCID-mg2p-4k2h-kfax","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7651","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7651"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-556","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-556"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7651","reference_id":"CVE-2015-7651","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7651"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7651"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg2p-4k2h-kfax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35926?format=json","vulnerability_id":"VCID-ng4k-gfs2-83g3","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7663","reference_id":"","reference_type":"","scores":[{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.9322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1049","scoring_system":"epss","scoring_elements":"0.93247","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7663"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7663","reference_id":"CVE-2015-7663","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7663"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7663"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-gfs2-83g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35925?format=json","vulnerability_id":"VCID-q8en-hn8w-6kgt","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7662","reference_id":"","reference_type":"","scores":[{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01794","scoring_system":"epss","scoring_elements":"0.82762","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7662"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77535","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77535"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7662","reference_id":"CVE-2015-7662","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:C/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7662"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7662"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8en-hn8w-6kgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35904?format=json","vulnerability_id":"VCID-qmv1-y1sb-x3bs","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7644","reference_id":"","reference_type":"","scores":[{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.9244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92451","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08652","scoring_system":"epss","scoring_elements":"0.92453","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7644"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7644"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmv1-y1sb-x3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35893?format=json","vulnerability_id":"VCID-qsh6-6x1b-7qdz","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7627","reference_id":"","reference_type":"","scores":[{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.9348","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7627"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qsh6-6x1b-7qdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35892?format=json","vulnerability_id":"VCID-r5dm-m1fk-hyab","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7626","reference_id":"","reference_type":"","scores":[{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.93475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11151","scoring_system":"epss","scoring_elements":"0.9348","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7626"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7626"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5dm-m1fk-hyab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35898?format=json","vulnerability_id":"VCID-u56n-hm7p-vqhx","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7631","reference_id":"","reference_type":"","scores":[{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.9035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90389","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7631"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383","reference_id":"1271383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271383"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7631"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u56n-hm7p-vqhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35930?format=json","vulnerability_id":"VCID-vpdv-hn5q-nqa2","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8046","reference_id":"","reference_type":"","scores":[{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98338","published_at":"2026-04-04T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.9834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.6207","scoring_system":"epss","scoring_elements":"0.98348","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8046"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"https://www.exploit-db.com/exploits/39019/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39019/"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8046","reference_id":"CVE-2015-8046","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8046"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=560","reference_id":"CVE-2015-8046;OSVDB-130015","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=560"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt","reference_id":"CVE-2015-8046;OSVDB-130015","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39019.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-8046"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vpdv-hn5q-nqa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35915?format=json","vulnerability_id":"VCID-w5pv-qzns-fyhz","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7657","reference_id":"","reference_type":"","scores":[{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0438","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7657"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-15-567","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-567"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7657","reference_id":"CVE-2015-7657","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7657"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-7657"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5pv-qzns-fyhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35928?format=json","vulnerability_id":"VCID-ydut-vswf-cydm","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2023.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8043","reference_id":"","reference_type":"","scores":[{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.9851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.66069","scoring_system":"epss","scoring_elements":"0.98511","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8043"},{"reference_url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"},{"reference_url":"http://www.securityfocus.com/bid/77533","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77533"},{"reference_url":"http://www.securitytracker.com/id/1034111","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062","reference_id":"1280062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1280062"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8043","reference_id":"CVE-2015-8043","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8043"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=557","reference_id":"CVE-2015-8043;OSVDB-130013","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=557"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt","reference_id":"CVE-2015-8043;OSVDB-130013","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/39022.txt"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2023","reference_id":"RHSA-2015:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-8043"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydut-vswf-cydm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35890?format=json","vulnerability_id":"VCID-yu4p-agr5-5ubn","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5569","reference_id":"","reference_type":"","scores":[{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90652","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90676","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90699","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5569"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271388","reference_id":"1271388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271388"},{"reference_url":"https://security.gentoo.org/glsa/201511-02","reference_id":"GLSA-201511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1893","reference_id":"RHSA-2015:1893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2024","reference_id":"RHSA-2015:2024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2024"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74248?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.548","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}],"aliases":["CVE-2015-5569"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yu4p-agr5-5ubn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.548"}