Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pcre3@7.3-1?distro=bullseye
Typedeb
Namespacedebian
Namepcre3
Version7.3-1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.6-1
Latest_non_vulnerable_version2:8.39-15
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1z8y-cqmn-s7gc
vulnerability_id VCID-1z8y-cqmn-s7gc
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1659
reference_id
reference_type
scores
0
value 0.05344
scoring_system epss
scoring_elements 0.90024
published_at 2026-04-01T12:55:00Z
1
value 0.05344
scoring_system epss
scoring_elements 0.90027
published_at 2026-04-02T12:55:00Z
2
value 0.05344
scoring_system epss
scoring_elements 0.90039
published_at 2026-04-04T12:55:00Z
3
value 0.05344
scoring_system epss
scoring_elements 0.90043
published_at 2026-04-07T12:55:00Z
4
value 0.05344
scoring_system epss
scoring_elements 0.90059
published_at 2026-04-08T12:55:00Z
5
value 0.05344
scoring_system epss
scoring_elements 0.90064
published_at 2026-04-09T12:55:00Z
6
value 0.05344
scoring_system epss
scoring_elements 0.90073
published_at 2026-04-11T12:55:00Z
7
value 0.05344
scoring_system epss
scoring_elements 0.90071
published_at 2026-04-12T12:55:00Z
8
value 0.05344
scoring_system epss
scoring_elements 0.90065
published_at 2026-04-13T12:55:00Z
9
value 0.05344
scoring_system epss
scoring_elements 0.90082
published_at 2026-04-18T12:55:00Z
10
value 0.05344
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-21T12:55:00Z
11
value 0.05344
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=315871
reference_id 315871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=315871
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://access.redhat.com/errata/RHSA-2007:0967
reference_id RHSA-2007:0967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0967
6
reference_url https://access.redhat.com/errata/RHSA-2007:1068
reference_id RHSA-2007:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1068
7
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-1659
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8y-cqmn-s7gc
1
url VCID-2dcv-wbjk-tqh8
vulnerability_id VCID-2dcv-wbjk-tqh8
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4767
reference_id
reference_type
scores
0
value 0.01955
scoring_system epss
scoring_elements 0.83412
published_at 2026-04-01T12:55:00Z
1
value 0.01955
scoring_system epss
scoring_elements 0.83426
published_at 2026-04-02T12:55:00Z
2
value 0.01955
scoring_system epss
scoring_elements 0.8344
published_at 2026-04-04T12:55:00Z
3
value 0.01955
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-07T12:55:00Z
4
value 0.01955
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-08T12:55:00Z
5
value 0.01955
scoring_system epss
scoring_elements 0.83473
published_at 2026-04-09T12:55:00Z
6
value 0.01955
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-11T12:55:00Z
7
value 0.01955
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-12T12:55:00Z
8
value 0.01955
scoring_system epss
scoring_elements 0.83477
published_at 2026-04-13T12:55:00Z
9
value 0.01955
scoring_system epss
scoring_elements 0.83514
published_at 2026-04-16T12:55:00Z
10
value 0.01955
scoring_system epss
scoring_elements 0.83515
published_at 2026-04-18T12:55:00Z
11
value 0.01955
scoring_system epss
scoring_elements 0.83516
published_at 2026-04-21T12:55:00Z
12
value 0.01955
scoring_system epss
scoring_elements 0.83539
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392901
reference_id 392901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392901
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-4767
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcv-wbjk-tqh8
2
url VCID-cs49-wfxj-j3ba
vulnerability_id VCID-cs49-wfxj-j3ba
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1661
reference_id
reference_type
scores
0
value 0.02034
scoring_system epss
scoring_elements 0.83744
published_at 2026-04-01T12:55:00Z
1
value 0.02034
scoring_system epss
scoring_elements 0.83758
published_at 2026-04-02T12:55:00Z
2
value 0.02034
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-04T12:55:00Z
3
value 0.02034
scoring_system epss
scoring_elements 0.83775
published_at 2026-04-07T12:55:00Z
4
value 0.02034
scoring_system epss
scoring_elements 0.83799
published_at 2026-04-08T12:55:00Z
5
value 0.02034
scoring_system epss
scoring_elements 0.83805
published_at 2026-04-09T12:55:00Z
6
value 0.02034
scoring_system epss
scoring_elements 0.83821
published_at 2026-04-11T12:55:00Z
7
value 0.02034
scoring_system epss
scoring_elements 0.83815
published_at 2026-04-12T12:55:00Z
8
value 0.02034
scoring_system epss
scoring_elements 0.8381
published_at 2026-04-13T12:55:00Z
9
value 0.02034
scoring_system epss
scoring_elements 0.83844
published_at 2026-04-18T12:55:00Z
10
value 0.02034
scoring_system epss
scoring_elements 0.83842
published_at 2026-04-21T12:55:00Z
11
value 0.02034
scoring_system epss
scoring_elements 0.83868
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392931
reference_id 392931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392931
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-1661
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs49-wfxj-j3ba
3
url VCID-dqaf-8bt4-e7b2
vulnerability_id VCID-dqaf-8bt4-e7b2
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4768
reference_id
reference_type
scores
0
value 0.09602
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-01T12:55:00Z
1
value 0.09602
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-02T12:55:00Z
2
value 0.09602
scoring_system epss
scoring_elements 0.92863
published_at 2026-04-04T12:55:00Z
3
value 0.09602
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-07T12:55:00Z
4
value 0.09602
scoring_system epss
scoring_elements 0.92869
published_at 2026-04-08T12:55:00Z
5
value 0.09602
scoring_system epss
scoring_elements 0.92873
published_at 2026-04-09T12:55:00Z
6
value 0.09602
scoring_system epss
scoring_elements 0.92878
published_at 2026-04-13T12:55:00Z
7
value 0.09602
scoring_system epss
scoring_elements 0.92888
published_at 2026-04-16T12:55:00Z
8
value 0.09602
scoring_system epss
scoring_elements 0.92889
published_at 2026-04-18T12:55:00Z
9
value 0.09602
scoring_system epss
scoring_elements 0.92895
published_at 2026-04-21T12:55:00Z
10
value 0.09602
scoring_system epss
scoring_elements 0.92898
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392911
reference_id 392911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392911
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://security.gentoo.org/glsa/200801-07
reference_id GLSA-200801-07
reference_type
scores
url https://security.gentoo.org/glsa/200801-07
6
reference_url https://access.redhat.com/errata/RHSA-2007:1126
reference_id RHSA-2007:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1126
7
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-4768
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqaf-8bt4-e7b2
4
url VCID-mha6-j74w-wudp
vulnerability_id VCID-mha6-j74w-wudp
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1662
reference_id
reference_type
scores
0
value 0.0407
scoring_system epss
scoring_elements 0.88488
published_at 2026-04-01T12:55:00Z
1
value 0.0407
scoring_system epss
scoring_elements 0.88496
published_at 2026-04-02T12:55:00Z
2
value 0.0407
scoring_system epss
scoring_elements 0.88512
published_at 2026-04-04T12:55:00Z
3
value 0.0407
scoring_system epss
scoring_elements 0.88516
published_at 2026-04-07T12:55:00Z
4
value 0.0407
scoring_system epss
scoring_elements 0.88534
published_at 2026-04-08T12:55:00Z
5
value 0.0407
scoring_system epss
scoring_elements 0.88539
published_at 2026-04-09T12:55:00Z
6
value 0.0407
scoring_system epss
scoring_elements 0.88551
published_at 2026-04-11T12:55:00Z
7
value 0.0407
scoring_system epss
scoring_elements 0.88543
published_at 2026-04-13T12:55:00Z
8
value 0.0407
scoring_system epss
scoring_elements 0.88557
published_at 2026-04-16T12:55:00Z
9
value 0.0407
scoring_system epss
scoring_elements 0.88553
published_at 2026-04-18T12:55:00Z
10
value 0.0407
scoring_system epss
scoring_elements 0.8855
published_at 2026-04-21T12:55:00Z
11
value 0.0407
scoring_system epss
scoring_elements 0.88568
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392921
reference_id 392921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392921
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-1662
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mha6-j74w-wudp
5
url VCID-sy5p-ju6m-vbgp
vulnerability_id VCID-sy5p-ju6m-vbgp
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1660
reference_id
reference_type
scores
0
value 0.05628
scoring_system epss
scoring_elements 0.903
published_at 2026-04-01T12:55:00Z
1
value 0.05628
scoring_system epss
scoring_elements 0.90303
published_at 2026-04-02T12:55:00Z
2
value 0.05628
scoring_system epss
scoring_elements 0.90315
published_at 2026-04-04T12:55:00Z
3
value 0.05628
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-07T12:55:00Z
4
value 0.05628
scoring_system epss
scoring_elements 0.90334
published_at 2026-04-08T12:55:00Z
5
value 0.05628
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-09T12:55:00Z
6
value 0.05628
scoring_system epss
scoring_elements 0.90349
published_at 2026-04-12T12:55:00Z
7
value 0.05628
scoring_system epss
scoring_elements 0.90342
published_at 2026-04-13T12:55:00Z
8
value 0.05628
scoring_system epss
scoring_elements 0.90358
published_at 2026-04-18T12:55:00Z
9
value 0.05628
scoring_system epss
scoring_elements 0.90355
published_at 2026-04-21T12:55:00Z
10
value 0.05628
scoring_system epss
scoring_elements 0.90371
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=315881
reference_id 315881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=315881
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://access.redhat.com/errata/RHSA-2007:0967
reference_id RHSA-2007:0967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0967
6
reference_url https://access.redhat.com/errata/RHSA-2007:0968
reference_id RHSA-2007:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0968
7
reference_url https://access.redhat.com/errata/RHSA-2007:1063
reference_id RHSA-2007:1063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1063
8
reference_url https://access.redhat.com/errata/RHSA-2007:1065
reference_id RHSA-2007:1065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1065
9
reference_url https://access.redhat.com/errata/RHSA-2008:0546
reference_id RHSA-2008:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0546
10
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-1660
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy5p-ju6m-vbgp
6
url VCID-vrjs-v8f3-s3d7
vulnerability_id VCID-vrjs-v8f3-s3d7
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4766
reference_id
reference_type
scores
0
value 0.03859
scoring_system epss
scoring_elements 0.88154
published_at 2026-04-01T12:55:00Z
1
value 0.03859
scoring_system epss
scoring_elements 0.88162
published_at 2026-04-02T12:55:00Z
2
value 0.03859
scoring_system epss
scoring_elements 0.88178
published_at 2026-04-04T12:55:00Z
3
value 0.03859
scoring_system epss
scoring_elements 0.88184
published_at 2026-04-07T12:55:00Z
4
value 0.03859
scoring_system epss
scoring_elements 0.88204
published_at 2026-04-08T12:55:00Z
5
value 0.03859
scoring_system epss
scoring_elements 0.8821
published_at 2026-04-09T12:55:00Z
6
value 0.03859
scoring_system epss
scoring_elements 0.88221
published_at 2026-04-11T12:55:00Z
7
value 0.03859
scoring_system epss
scoring_elements 0.88213
published_at 2026-04-13T12:55:00Z
8
value 0.03859
scoring_system epss
scoring_elements 0.88226
published_at 2026-04-16T12:55:00Z
9
value 0.03859
scoring_system epss
scoring_elements 0.88225
published_at 2026-04-21T12:55:00Z
10
value 0.03859
scoring_system epss
scoring_elements 0.88243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4766
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392891
reference_id 392891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392891
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/pcre3@7.3-1?distro=bullseye
purl pkg:deb/debian/pcre3@7.3-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye
1
url pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye
2
url pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
purl pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye
aliases CVE-2007-4766
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrjs-v8f3-s3d7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye