Lookup for vulnerable packages by Package URL.

GET /api/packages/934565?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
    "type": "deb",
    "namespace": "debian",
    "name": "pcre3",
    "version": "2:8.38-1",
    "qualifiers": {
        "distro": "bullseye"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2:8.38-2",
    "latest_non_vulnerable_version": "2:8.39-15",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34906?format=api",
            "vulnerability_id": "VCID-3a9g-pj5j-nbbc",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8082",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80816",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80707",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80728",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80761",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80777",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80762",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80753",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8079",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80791",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80792",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8387"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287646",
                    "reference_id": "1287646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287646"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8387",
                    "reference_id": "CVE-2015-8387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8387"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8387"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3a9g-pj5j-nbbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34912?format=api",
            "vulnerability_id": "VCID-4kzr-datq-bbcp",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89027",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88966",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89002",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89008",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89006",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89019",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8392"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287690",
                    "reference_id": "1287690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287690"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8392",
                    "reference_id": "CVE-2015-8392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8392"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34913?format=api",
            "vulnerability_id": "VCID-52he-28zb-z7bj",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72465",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72456",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72328",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72329",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72368",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72403",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72375",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72416",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72414",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8393"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287695",
                    "reference_id": "1287695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287695"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8393",
                    "reference_id": "CVE-2015-8393",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8393"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8393"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52he-28zb-z7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34915?format=api",
            "vulnerability_id": "VCID-5vhs-7ffz-rkaf",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85129",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85035",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85057",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8508",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85079",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85075",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85096",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85099",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8512",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8395"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711",
                    "reference_id": "1287711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8395",
                    "reference_id": "CVE-2015-8395",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8395"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8395"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34914?format=api",
            "vulnerability_id": "VCID-7vb2-byp7-uyb3",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8321",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83203",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83072",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83089",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83133",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83149",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83144",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83139",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8318",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8394"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287702",
                    "reference_id": "1287702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287702"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8394",
                    "reference_id": "CVE-2015-8394",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8394"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8394"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vb2-byp7-uyb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34904?format=api",
            "vulnerability_id": "VCID-a952-adu8-8qfx",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.899",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89835",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89838",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89873",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89879",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89885",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89883",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89876",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8989",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89891",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8385"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85572",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/85572"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287629",
                    "reference_id": "1287629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287629"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8385",
                    "reference_id": "CVE-2015-8385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8385"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34909?format=api",
            "vulnerability_id": "VCID-cbu7-jb3m-nbf2",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85816",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85806",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85704",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85722",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85748",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85773",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85785",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85789",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85783",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8389"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287659",
                    "reference_id": "1287659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287659"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8389",
                    "reference_id": "CVE-2015-8389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8389"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8389"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbu7-jb3m-nbf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34911?format=api",
            "vulnerability_id": "VCID-dfts-4w3d-huc3",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91072",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91074",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90986",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90991",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91037",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9106",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91058",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91061",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8391"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287671",
                    "reference_id": "1287671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287671"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8391",
                    "reference_id": "CVE-2015-8391",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8391"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8391"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34905?format=api",
            "vulnerability_id": "VCID-kwfj-9bb2-dqcb",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91825",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9183",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91768",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91776",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91782",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91803",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91814",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9181",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8386"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287636",
                    "reference_id": "1287636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287636"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8386",
                    "reference_id": "CVE-2015-8386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8386"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8386"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34910?format=api",
            "vulnerability_id": "VCID-mnr6-xgc9-xucz",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86312",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86302",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86231",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8625",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86276",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86269",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8629",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86283",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8390"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287666",
                    "reference_id": "1287666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287666"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8390",
                    "reference_id": "CVE-2015-8390",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8390"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8390"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnr6-xgc9-xucz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7607?format=api",
            "vulnerability_id": "VCID-pejf-33ba-h3c1",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nPCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75005",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75037",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75013",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75047",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75059",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75081",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7506",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75049",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75087",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75094",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75123",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75127",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3217"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228283",
                    "reference_id": "1228283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228283"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641",
                    "reference_id": "787641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3217",
                    "reference_id": "CVE-2015-3217",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3217"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-3217"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34901?format=api",
            "vulnerability_id": "VCID-tx1n-v7bn-7uhw",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90472",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90476",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90487",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90493",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90505",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90511",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9052",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90532",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90531",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9053",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8381"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1667"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711",
                    "reference_id": "1287711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539",
                    "reference_id": "795539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8381",
                    "reference_id": "CVE-2015-8381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8381"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8381"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34899?format=api",
            "vulnerability_id": "VCID-va26-j6rt-buab",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79285",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79173",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79179",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79189",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79214",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79222",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7923",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79247",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7928",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8380"
                },
                {
                    "reference_url": "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77695"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285413",
                    "reference_id": "1285413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285413"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467",
                    "reference_id": "806467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8380",
                    "reference_id": "CVE-2015-8380",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8380"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8380"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-va26-j6rt-buab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85285?format=api",
            "vulnerability_id": "VCID-xwr2-6zpb-x7cn",
            "summary": "pcre: incorrect nested table jumps when JIT is used (8.36/6)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76222",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76212",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76085",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76145",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76185",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76189",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76172",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9769"
                },
                {
                    "reference_url": "https://bugs.debian.org/819050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/819050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769"
                },
                {
                    "reference_url": "https://redmine.openinfosecfoundation.org/issues/1693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://redmine.openinfosecfoundation.org/issues/1693"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre?view=revision&revision=1475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre?view=revision&revision=1475"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/26/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/03/26/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/85570"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035424"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320995",
                    "reference_id": "1320995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320995"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050",
                    "reference_id": "819050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9769",
                    "reference_id": "CVE-2014-9769",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9769"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2014-9769"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwr2-6zpb-x7cn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34902?format=api",
            "vulnerability_id": "VCID-yztb-bavc-kkgt",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84902",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84892",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84771",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84786",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84806",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84807",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8483",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84836",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84851",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84846",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84867",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84868",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84866",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8383"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287614",
                    "reference_id": "1287614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287614"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8383",
                    "reference_id": "CVE-2015-8383",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8383"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8383"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
}