{"uuid": "9e79de05-1ce1-4460-88ac-4099222b8633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-7855", "type": "exploited", "source": "https://t.me/itsecalert/48", "content": "\u26a0\ufe0f Flash critical vulnerability (Update now!) CVE-2016-7855:  use-after-free vulnerability that could lead to code execution  (severity: \ud83d\udd38high) Further Info: http://mcaf.ee/jmx65k\n#alert #vulnerability #severityhigh #linux #OSX #Windows #Flash #Remote #exploitednow\n\nPlease subscribe (and let your sysadmins subscribe) to our email alerts: https://infected.io/e-mail-it-security-alerts - just alerts, no spam.", "creation_timestamp": "2016-10-28T12:53:40.000000Z"}