Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 8.9
https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
https://access.redhat.com/errata/RHSA-2015:2593
https://access.redhat.com/security/cve/cve-2015-8443
https://access.redhat.com/security/cve/cve-2015-8438
https://access.redhat.com/security/cve/cve-2015-8441
https://access.redhat.com/security/cve/cve-2015-8440
https://access.redhat.com/security/cve/cve-2015-8447
https://access.redhat.com/security/cve/cve-2015-8446
https://access.redhat.com/security/cve/cve-2015-8445
https://access.redhat.com/security/cve/cve-2015-8442
https://access.redhat.com/security/cve/cve-2015-8449
https://access.redhat.com/security/cve/cve-2015-8448
https://access.redhat.com/security/cve/cve-2015-8427
https://access.redhat.com/security/cve/cve-2015-8429
https://access.redhat.com/security/cve/cve-2015-8067
https://access.redhat.com/security/cve/cve-2015-8453
https://access.redhat.com/security/cve/cve-2015-8452
https://access.redhat.com/security/cve/cve-2015-8066
https://access.redhat.com/security/cve/cve-2015-8455
https://access.redhat.com/security/cve/cve-2015-8047
https://access.redhat.com/security/cve/cve-2015-8068
https://access.redhat.com/security/cve/cve-2015-8045
https://access.redhat.com/security/cve/cve-2015-8444
https://access.redhat.com/security/cve/cve-2015-8428
https://access.redhat.com/security/cve/cve-2015-8061
https://access.redhat.com/security/cve/cve-2015-8060
https://access.redhat.com/security/cve/cve-2015-8063
https://access.redhat.com/security/cve/cve-2015-8062
https://access.redhat.com/security/cve/cve-2015-8065
https://access.redhat.com/security/cve/cve-2015-8064
https://access.redhat.com/security/cve/cve-2015-8049
https://access.redhat.com/security/cve/cve-2015-8048
https://access.redhat.com/security/cve/cve-2015-8410
https://access.redhat.com/security/cve/cve-2015-8411
https://access.redhat.com/security/cve/cve-2015-8412
https://access.redhat.com/security/cve/cve-2015-8413
https://access.redhat.com/security/cve/cve-2015-8414
https://access.redhat.com/security/cve/cve-2015-8415
https://access.redhat.com/security/cve/cve-2015-8416
https://access.redhat.com/security/cve/cve-2015-8417
https://access.redhat.com/security/cve/cve-2015-8418
https://access.redhat.com/security/cve/cve-2015-8419
https://access.redhat.com/security/cve/cve-2015-8430
https://access.redhat.com/security/cve/cve-2015-8431
https://access.redhat.com/security/cve/cve-2015-8436
https://access.redhat.com/security/cve/cve-2015-8437
https://access.redhat.com/security/cve/cve-2015-8434
https://access.redhat.com/security/cve/cve-2015-8435
https://access.redhat.com/security/cve/cve-2015-8069
https://access.redhat.com/security/cve/cve-2015-8454
https://access.redhat.com/security/cve/cve-2015-8432
https://access.redhat.com/security/cve/cve-2015-8439
https://access.redhat.com/security/cve/cve-2015-8433
https://access.redhat.com/security/cve/cve-2015-8426
https://access.redhat.com/security/cve/cve-2015-8050
https://access.redhat.com/security/cve/cve-2015-8055
https://access.redhat.com/security/cve/cve-2015-8056
https://access.redhat.com/security/cve/cve-2015-8057
https://access.redhat.com/security/cve/cve-2015-8058
https://access.redhat.com/security/cve/cve-2015-8059
https://access.redhat.com/security/cve/cve-2015-8070
https://access.redhat.com/security/cve/cve-2015-8071
https://access.redhat.com/security/cve/cve-2015-8450
https://access.redhat.com/security/cve/cve-2015-8451
https://access.redhat.com/security/cve/cve-2015-8407
https://access.redhat.com/security/cve/cve-2015-8406
https://access.redhat.com/security/cve/cve-2015-8405
https://access.redhat.com/security/cve/cve-2015-8404
https://access.redhat.com/security/cve/cve-2015-8403
https://access.redhat.com/security/cve/cve-2015-8402
https://access.redhat.com/security/cve/cve-2015-8401
https://access.redhat.com/security/cve/cve-2015-8421
https://access.redhat.com/security/cve/cve-2015-8420
https://access.redhat.com/security/cve/cve-2015-8423
https://access.redhat.com/security/cve/cve-2015-8422
https://access.redhat.com/security/cve/cve-2015-8425
https://access.redhat.com/security/cve/cve-2015-8424
https://access.redhat.com/security/cve/cve-2015-8409
https://access.redhat.com/security/cve/cve-2015-8408
https://access.redhat.com/security/cve/cve-2015-8456
https://access.redhat.com/security/cve/cve-2015-8457
https://access.redhat.com/security/cve/cve-2015-8652
https://access.redhat.com/security/cve/cve-2015-8653
https://access.redhat.com/security/cve/cve-2015-8654
https://access.redhat.com/security/cve/cve-2015-8655
https://access.redhat.com/security/cve/cve-2015-8656
https://access.redhat.com/security/cve/cve-2015-8657
https://access.redhat.com/security/cve/cve-2015-8658
https://access.redhat.com/security/cve/cve-2015-8820
https://access.redhat.com/security/cve/cve-2015-8821