{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60814?format=json","vulnerability_id":"VCID-8stg-w4ak-cqac","summary":"Multiple vulnerabilities have been found in Adobe Flash Player, the\n    worst of which allows remote attackers to execute arbitrary code.","aliases":[{"alias":"CVE-2015-5554"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85471?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@11.2.202.508","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@11.2.202.508"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/117272?format=json","purl":"pkg:rpm/redhat/flash-plugin@11.2.202.508-1?arch=el6_7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1821-4wne-4qht"},{"vulnerability":"VCID-1gq6-4hu1-dyg7"},{"vulnerability":"VCID-4y1q-9k3b-ayfu"},{"vulnerability":"VCID-6vwz-15qc-uuag"},{"vulnerability":"VCID-7yd2-jnxr-nkgc"},{"vulnerability":"VCID-8stg-w4ak-cqac"},{"vulnerability":"VCID-9e8s-brd4-kkcu"},{"vulnerability":"VCID-a9xw-xj4u-ykhe"},{"vulnerability":"VCID-ap7h-z42q-f7ef"},{"vulnerability":"VCID-b85a-m7t6-wbgb"},{"vulnerability":"VCID-bb2q-n39j-nqhr"},{"vulnerability":"VCID-bwad-7tvv-tkhy"},{"vulnerability":"VCID-chf4-yeu9-d7eq"},{"vulnerability":"VCID-cmhh-gkd9-4ydd"},{"vulnerability":"VCID-e7xw-p5hp-jyg7"},{"vulnerability":"VCID-ecgg-8rq8-nyfk"},{"vulnerability":"VCID-ets4-2uvp-9uc1"},{"vulnerability":"VCID-ezsx-h3gb-67bc"},{"vulnerability":"VCID-j253-du81-kydk"},{"vulnerability":"VCID-jckv-a8n4-xqh5"},{"vulnerability":"VCID-jmdq-g8zp-a3gn"},{"vulnerability":"VCID-kp2j-n39c-xudw"},{"vulnerability":"VCID-njzk-bhzh-p7g4"},{"vulnerability":"VCID-pzgs-6q31-jfex"},{"vulnerability":"VCID-qw87-adba-z3dn"},{"vulnerability":"VCID-sbch-tcn3-9bff"},{"vulnerability":"VCID-tprj-3djs-8fcv"},{"vulnerability":"VCID-umzu-u64u-x7ea"},{"vulnerability":"VCID-utt5-s83a-aqcx"},{"vulnerability":"VCID-vzju-s4hg-27dn"},{"vulnerability":"VCID-w2ef-4rqb-bbbx"},{"vulnerability":"VCID-w4ad-7b1u-vufr"},{"vulnerability":"VCID-zts9-v5cv-9fh7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.508-1%3Farch=el6_7"},{"url":"http://public2.vulnerablecode.io/api/packages/117271?format=json","purl":"pkg:rpm/redhat/flash-plugin@11.2.202.508-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1821-4wne-4qht"},{"vulnerability":"VCID-1gq6-4hu1-dyg7"},{"vulnerability":"VCID-4y1q-9k3b-ayfu"},{"vulnerability":"VCID-6vwz-15qc-uuag"},{"vulnerability":"VCID-7yd2-jnxr-nkgc"},{"vulnerability":"VCID-8stg-w4ak-cqac"},{"vulnerability":"VCID-9e8s-brd4-kkcu"},{"vulnerability":"VCID-a9xw-xj4u-ykhe"},{"vulnerability":"VCID-ap7h-z42q-f7ef"},{"vulnerability":"VCID-b85a-m7t6-wbgb"},{"vulnerability":"VCID-bb2q-n39j-nqhr"},{"vulnerability":"VCID-bwad-7tvv-tkhy"},{"vulnerability":"VCID-chf4-yeu9-d7eq"},{"vulnerability":"VCID-cmhh-gkd9-4ydd"},{"vulnerability":"VCID-e7xw-p5hp-jyg7"},{"vulnerability":"VCID-ecgg-8rq8-nyfk"},{"vulnerability":"VCID-ets4-2uvp-9uc1"},{"vulnerability":"VCID-ezsx-h3gb-67bc"},{"vulnerability":"VCID-j253-du81-kydk"},{"vulnerability":"VCID-jckv-a8n4-xqh5"},{"vulnerability":"VCID-jmdq-g8zp-a3gn"},{"vulnerability":"VCID-kp2j-n39c-xudw"},{"vulnerability":"VCID-njzk-bhzh-p7g4"},{"vulnerability":"VCID-pzgs-6q31-jfex"},{"vulnerability":"VCID-qw87-adba-z3dn"},{"vulnerability":"VCID-sbch-tcn3-9bff"},{"vulnerability":"VCID-tprj-3djs-8fcv"},{"vulnerability":"VCID-umzu-u64u-x7ea"},{"vulnerability":"VCID-utt5-s83a-aqcx"},{"vulnerability":"VCID-vzju-s4hg-27dn"},{"vulnerability":"VCID-w2ef-4rqb-bbbx"},{"vulnerability":"VCID-w4ad-7b1u-vufr"},{"vulnerability":"VCID-zts9-v5cv-9fh7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@11.2.202.508-1%3Farch=el5"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5554.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5554","reference_id":"","reference_type":"","scores":[{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47024","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5554"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697","reference_id":"1252697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252697"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=416&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id","reference_id":"CVE-2015-5554","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=416&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37876.txt","reference_id":"CVE-2015-5554","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/37876.txt"},{"reference_url":"https://security.gentoo.org/glsa/201508-01","reference_id":"GLSA-201508-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1603","reference_id":"RHSA-2015:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1603"}],"weaknesses":[],"exploits":[{"date_added":"2015-08-19","description":"Adobe Flash - XMLSocket Destructor Not Cleared Before Setting User Data in connect","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2015-08-19","exploit_type":"dos","platform":"linux_x86-64","source_date_updated":"2015-08-19","data_source":"Exploit-DB","source_url":"https://code.google.com/p/google-security-research/issues/detail?id=416&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id"}],"severity_range_score":null,"exploitability":"2.0","weighted_severity":"0.4","risk_score":0.8,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8stg-w4ak-cqac"}