{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47867?format=json","vulnerability_id":"VCID-9exz-cbxm-u3ap","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","aliases":[{"alias":"CVE-2015-3105"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77273?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.466","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.466"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/117939?format=json","purl":"pkg:rpm/redhat/flash-plugin@11.2.202.466-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4n54-r9e2-syd8"},{"vulnerability":"VCID-582a-u4qz-ckek"},{"vulnerability":"VCID-6cbr-s2ey-jfcb"},{"vulnerability":"VCID-9exz-cbxm-u3ap"},{"vulnerability":"VCID-ds3j-m8vm-vqbx"},{"vulnerability":"VCID-dzn9-3wfw-7yem"},{"vulnerability":"VCID-em98-jbgn-47h8"},{"vulnerability":"VCID-ersd-m7fc-hfbq"},{"vulnerability":"VCID-rvmf-rwu6-73d3"},{"vulnerability":"VCID-x76v-rr7b-5bee"},{"vulnerability":"VCID-y1kc-4ku3-wbbv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.466-1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/117938?format=json","purl":"pkg:rpm/redhat/flash-plugin@11.2.202.466-1?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4n54-r9e2-syd8"},{"vulnerability":"VCID-582a-u4qz-ckek"},{"vulnerability":"VCID-6cbr-s2ey-jfcb"},{"vulnerability":"VCID-9exz-cbxm-u3ap"},{"vulnerability":"VCID-ds3j-m8vm-vqbx"},{"vulnerability":"VCID-dzn9-3wfw-7yem"},{"vulnerability":"VCID-em98-jbgn-47h8"},{"vulnerability":"VCID-ersd-m7fc-hfbq"},{"vulnerability":"VCID-rvmf-rwu6-73d3"},{"vulnerability":"VCID-x76v-rr7b-5bee"},{"vulnerability":"VCID-y1kc-4ku3-wbbv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.466-1%3Farch=el6_6"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3105","reference_id":"","reference_type":"","scores":[{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.996","published_at":"2026-04-29T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99602","published_at":"2026-05-05T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99604","published_at":"2026-05-11T12:55:00Z"},{"value":"0.90264","scoring_system":"epss","scoring_elements":"0.99605","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3105"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229879","reference_id":"1229879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229879"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb","reference_id":"CVE-2015-3105;OSVDB-123023","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37448.rb"},{"reference_url":"https://security.gentoo.org/glsa/201506-01","reference_id":"GLSA-201506-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201506-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1086","reference_id":"RHSA-2015:1086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1086"}],"weaknesses":[],"exploits":[{"date_added":"2015-06-30","description":"Adobe Flash Player - Drawing Fill Shader Memory Corruption (Metasploit)","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2015-06-30","exploit_type":"remote","platform":"multiple","source_date_updated":"2015-06-30","data_source":"Exploit-DB","source_url":""},{"date_added":null,"description":"This module exploits a memory corruption happening when applying a Shader as a drawing fill\n          as exploited in the wild on June 2015. This module has been tested successfully on:\n\n          Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.188,\n          Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.188,\n          Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.188, and\n          Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.460.","required_action":null,"due_date":null,"notes":"Reliability:\n  - unknown-reliability\nStability:\n  - unknown-stability\nSideEffects:\n  - unknown-side-effects\n","known_ransomware_campaign_use":false,"source_date_published":"2015-05-12","exploit_type":null,"platform":"Linux,Windows","source_date_updated":null,"data_source":"Metasploit","source_url":"https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/adobe_flash_shader_drawing_fill.rb"}],"severity_range_score":null,"exploitability":"2.0","weighted_severity":"0.8","risk_score":1.6,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9exz-cbxm-u3ap"}