Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 8.9
https://helpx.adobe.com/security/products/flash-player/apsb16-25.html
https://access.redhat.com/errata/RHSA-2016:1423
https://access.redhat.com/security/cve/cve-2016-4183
https://access.redhat.com/security/cve/cve-2016-4182
https://access.redhat.com/security/cve/cve-2016-4181
https://access.redhat.com/security/cve/cve-2016-4180
https://access.redhat.com/security/cve/cve-2016-4187
https://access.redhat.com/security/cve/cve-2016-4186
https://access.redhat.com/security/cve/cve-2016-4185
https://access.redhat.com/security/cve/cve-2016-4184
https://access.redhat.com/security/cve/cve-2016-4231
https://access.redhat.com/security/cve/cve-2016-4230
https://access.redhat.com/security/cve/cve-2016-4189
https://access.redhat.com/security/cve/cve-2016-4188
https://access.redhat.com/security/cve/cve-2016-4235
https://access.redhat.com/security/cve/cve-2016-4234
https://access.redhat.com/security/cve/cve-2016-4219
https://access.redhat.com/security/cve/cve-2016-4218
https://access.redhat.com/security/cve/cve-2016-4238
https://access.redhat.com/security/cve/cve-2016-4217
https://access.redhat.com/security/cve/cve-2016-4246
https://access.redhat.com/security/cve/cve-2016-4243
https://access.redhat.com/security/cve/cve-2016-4247
https://access.redhat.com/security/cve/cve-2016-4244
https://access.redhat.com/security/cve/cve-2016-4240
https://access.redhat.com/security/cve/cve-2016-4236
https://access.redhat.com/security/cve/cve-2016-4237
https://access.redhat.com/security/cve/cve-2016-4190
https://access.redhat.com/security/cve/cve-2016-4233
https://access.redhat.com/security/cve/cve-2016-4228
https://access.redhat.com/security/cve/cve-2016-4229
https://access.redhat.com/security/cve/cve-2016-4248
https://access.redhat.com/security/cve/cve-2016-4249
https://access.redhat.com/security/cve/cve-2016-4222
https://access.redhat.com/security/cve/cve-2016-4223
https://access.redhat.com/security/cve/cve-2016-4220
https://access.redhat.com/security/cve/cve-2016-4221
https://access.redhat.com/security/cve/cve-2016-4226
https://access.redhat.com/security/cve/cve-2016-4227
https://access.redhat.com/security/cve/cve-2016-4224
https://access.redhat.com/security/cve/cve-2016-4225
https://access.redhat.com/security/cve/cve-2016-4172
https://access.redhat.com/security/cve/cve-2016-4173
https://access.redhat.com/security/cve/cve-2016-4176
https://access.redhat.com/security/cve/cve-2016-4177
https://access.redhat.com/security/cve/cve-2016-4174
https://access.redhat.com/security/cve/cve-2016-4175
https://access.redhat.com/security/cve/cve-2016-4178
https://access.redhat.com/security/cve/cve-2016-4179
https://access.redhat.com/security/cve/cve-2016-4242
https://access.redhat.com/security/cve/cve-2016-4241
https://access.redhat.com/security/cve/cve-2016-4232
https://access.redhat.com/security/cve/cve-2016-4245