Lookup for vulnerable packages by Package URL.

GET /api/packages/77273?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
    "type": "ebuild",
    "namespace": "www-plugins",
    "name": "adobe-flash",
    "version": "11.2.202.466",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "11.2.202.481",
    "latest_non_vulnerable_version": "32.0.0.387",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47857?format=api",
            "vulnerability_id": "VCID-26vm-tyrc-nbgd",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92681",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92689",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92695",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92694",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92704",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92714",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92724",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92729",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92733",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92736",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92749",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.09216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92761",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3097"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3097"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26vm-tyrc-nbgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47862?format=api",
            "vulnerability_id": "VCID-38j5-g7mu-6kcn",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67715",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67748",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67768",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67815",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67838",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67788",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67819",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67848",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67853",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67829",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67872",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67912",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3101"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3101"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38j5-g7mu-6kcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47864?format=api",
            "vulnerability_id": "VCID-4n54-r9e2-syd8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69123",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3102"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3102"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4n54-r9e2-syd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47865?format=api",
            "vulnerability_id": "VCID-582a-u4qz-ckek",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83204",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83267",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83273",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83309",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8331",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83311",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83335",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83342",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83348",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83373",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83394",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01907",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83413",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3103"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3103"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-582a-u4qz-ckek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47856?format=api",
            "vulnerability_id": "VCID-6cbr-s2ey-jfcb",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62018",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62077",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62078",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62146",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62154",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62133",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62183",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62195",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62189",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62182",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6224",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3096"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230185",
                    "reference_id": "1230185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230185"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3096"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cbr-s2ey-jfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47871?format=api",
            "vulnerability_id": "VCID-6mc3-fgw8-5qby",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58413",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58498",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58518",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58541",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58548",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58564",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58545",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58558",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58563",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58509",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58507",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58473",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58517",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58574",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775687",
                    "reference_id": "775687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775687"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7788-1/",
                    "reference_id": "USN-7788-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7788-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-4472"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mc3-fgw8-5qby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47867?format=api",
            "vulnerability_id": "VCID-9exz-cbxm-u3ap",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99594",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99597",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.996",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99602",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.90264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99604",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3105"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb",
                    "reference_id": "CVE-2015-3105;OSVDB-123023",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3105"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9exz-cbxm-u3ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47861?format=api",
            "vulnerability_id": "VCID-ds3j-m8vm-vqbx",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3100.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3100.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87353",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87363",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87379",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87378",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87396",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87403",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8741",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87406",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87421",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87418",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87441",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87455",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8747",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87487",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3100"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3100"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3j-m8vm-vqbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47869?format=api",
            "vulnerability_id": "VCID-dzn9-3wfw-7yem",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3107.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3107.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97839",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97844",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97846",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9786",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97862",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97869",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9787",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97868",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97867",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97871",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97875",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97874",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.50806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97877",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3107"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=352&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3107",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=352&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37850.txt",
                    "reference_id": "CVE-2015-3107",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37850.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201508-01",
                    "reference_id": "GLSA-201508-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201508-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85471?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.508",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.508"
                }
            ],
            "aliases": [
                "CVE-2015-3107"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzn9-3wfw-7yem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47858?format=api",
            "vulnerability_id": "VCID-em98-jbgn-47h8",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3098.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3098.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69123",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3098"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3098"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-em98-jbgn-47h8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47868?format=api",
            "vulnerability_id": "VCID-ersd-m7fc-hfbq",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3106.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3106.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98019",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98022",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98027",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98039",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98037",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98036",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98041",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98049",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98047",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.54609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9805",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3106"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=330&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id",
                    "reference_id": "CVE-2015-3106;OSVDB-123024",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=330&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37847.txt",
                    "reference_id": "CVE-2015-3106;OSVDB-123024",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/37847.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3106"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ersd-m7fc-hfbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47859?format=api",
            "vulnerability_id": "VCID-rvmf-rwu6-73d3",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3099.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3099.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69002",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69067",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69048",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69123",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3099"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189",
                    "reference_id": "1230189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230189"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3099"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvmf-rwu6-73d3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47870?format=api",
            "vulnerability_id": "VCID-x76v-rr7b-5bee",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63278",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63307",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63323",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63342",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63359",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63343",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63341",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63348",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63346",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63329",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63374",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63426",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3108"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230201",
                    "reference_id": "1230201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230201"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3108"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x76v-rr7b-5bee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47866?format=api",
            "vulnerability_id": "VCID-y1kc-4ku3-wbbv",
            "summary": "Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3104.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3104.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89048",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89108",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89104",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89102",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89116",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8913",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89137",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89141",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89149",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89165",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89176",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3104"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879",
                    "reference_id": "1229879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1229879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-01",
                    "reference_id": "GLSA-201506-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1086",
                    "reference_id": "RHSA-2015:1086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1086"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77273?format=api",
                    "purl": "pkg:ebuild/www-plugins/adobe-flash@11.2.202.466",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
                }
            ],
            "aliases": [
                "CVE-2015-3104"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1kc-4ku3-wbbv"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"
}