{"url":"http://public2.vulnerablecode.io/api/packages/1050705?format=json","purl":"pkg:deb/debian/pcre3@8.02-1.1%2Bdeb6u1","type":"deb","namespace":"debian","name":"pcre3","version":"8.02-1.1+deb6u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2:8.39-13","latest_non_vulnerable_version":"2:8.39-13","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34908?format=json","vulnerability_id":"VCID-1rdp-4637-tfh7","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8388","reference_id":"","reference_type":"","scores":[{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88701","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.887","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8388"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223","reference_id":"1237223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388","reference_id":"CVE-2015-8388","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8388"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rdp-4637-tfh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34906?format=json","vulnerability_id":"VCID-3a9g-pj5j-nbbc","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387","reference_id":"","reference_type":"","scores":[{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646","reference_id":"1287646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387","reference_id":"CVE-2015-8387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8387"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3a9g-pj5j-nbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34916?format=json","vulnerability_id":"VCID-3vg3-y6dk-n3ag","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1283","reference_id":"","reference_type":"","scores":[{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.87992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.88006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.87983","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1283"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1767","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283"},{"reference_url":"https://www.tenable.com/security/tns-2016-18","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-18"},{"reference_url":"https://www.tenable.com/security/tns-2017-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-14"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/79825","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79825"},{"reference_url":"http://www.securitytracker.com/id/1034555","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034555"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1295385","reference_id":"1295385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1295385"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706","reference_id":"809706","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1283","reference_id":"CVE-2016-1283","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1283"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2016-1283"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vg3-y6dk-n3ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34896?format=json","vulnerability_id":"VCID-3wxw-5hsh-tqhj","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5073","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67868","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223","reference_id":"1237223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000","reference_id":"790000","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-5073"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wxw-5hsh-tqhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34912?format=json","vulnerability_id":"VCID-4kzr-datq-bbcp","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392","reference_id":"","reference_type":"","scores":[{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.8899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89002","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690","reference_id":"1287690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392","reference_id":"CVE-2015-8392","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8392"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34913?format=json","vulnerability_id":"VCID-52he-28zb-z7bj","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393","reference_id":"","reference_type":"","scores":[{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72368","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695","reference_id":"1287695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393","reference_id":"CVE-2015-8393","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8393"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52he-28zb-z7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34915?format=json","vulnerability_id":"VCID-5vhs-7ffz-rkaf","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395","reference_id":"","reference_type":"","scores":[{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85079","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395","reference_id":"CVE-2015-8395","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8395"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62237?format=json","vulnerability_id":"VCID-7386-q1qx-2fgr","summary":"Multiple vulnerabilities have been found in the PCRE Library, the\n    worst of which may allow remote attackers to cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7244","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67032","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66996","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7244"},{"reference_url":"https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/97067","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97067"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437364","reference_id":"1437364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437364"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683","reference_id":"858683","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683"},{"reference_url":"https://security.archlinux.org/ASA-201707-20","reference_id":"ASA-201707-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-20"},{"reference_url":"https://security.archlinux.org/AVG-222","reference_id":"AVG-222","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7244","reference_id":"CVE-2017-7244","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7244"},{"reference_url":"https://security.gentoo.org/glsa/201710-25","reference_id":"GLSA-201710-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-25"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1057346?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-eupp-h1mx-13dy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3"}],"aliases":["CVE-2017-7244"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7386-q1qx-2fgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34895?format=json","vulnerability_id":"VCID-79s2-s1sx-3uag","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0534.html"},{"reference_url":"http://bugs.exim.org/show_bug.cgi?id=1546","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.exim.org/show_bug.cgi?id=1546"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0330.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0330.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8964","reference_id":"","reference_type":"","scores":[{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.8389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.839","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.exim.org/viewvc/pcre?view=revision&revision=1513","reference_id":"","reference_type":"","scores":[],"url":"http://www.exim.org/viewvc/pcre?view=revision&revision=1513"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:002","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:002"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:137"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/21/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/11/21/6"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"reference_url":"http://www.securityfocus.com/bid/71206","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1166147","reference_id":"1166147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1166147"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478","reference_id":"770478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8964","reference_id":"CVE-2014-8964","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8964"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0330","reference_id":"RHSA-2015:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0330"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050708?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-3.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1rdp-4637-tfh7"},{"vulnerability":"VCID-3a9g-pj5j-nbbc"},{"vulnerability":"VCID-3vg3-y6dk-n3ag"},{"vulnerability":"VCID-3wxw-5hsh-tqhj"},{"vulnerability":"VCID-4kzr-datq-bbcp"},{"vulnerability":"VCID-52he-28zb-z7bj"},{"vulnerability":"VCID-5vhs-7ffz-rkaf"},{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-7ufs-uvgd-v3ht"},{"vulnerability":"VCID-7vb2-byp7-uyb3"},{"vulnerability":"VCID-a952-adu8-8qfx"},{"vulnerability":"VCID-cbu7-jb3m-nbf2"},{"vulnerability":"VCID-dfts-4w3d-huc3"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-jkr1-gvjw-wkcx"},{"vulnerability":"VCID-kwfj-9bb2-dqcb"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-mfmv-rw7p-rqbe"},{"vulnerability":"VCID-mnr6-xgc9-xucz"},{"vulnerability":"VCID-mq83-9qaf-ffgc"},{"vulnerability":"VCID-pejf-33ba-h3c1"},{"vulnerability":"VCID-tx1n-v7bn-7uhw"},{"vulnerability":"VCID-udse-25e2-vfeb"},{"vulnerability":"VCID-va26-j6rt-buab"},{"vulnerability":"VCID-vjaf-nq1r-e3bm"},{"vulnerability":"VCID-wx7q-7bp6-bybq"},{"vulnerability":"VCID-xwr2-6zpb-x7cn"},{"vulnerability":"VCID-ywee-ghvk-pubu"},{"vulnerability":"VCID-yztb-bavc-kkgt"},{"vulnerability":"VCID-zjgd-f5nj-zybz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-3.3"}],"aliases":["CVE-2014-8964"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79s2-s1sx-3uag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85857?format=json","vulnerability_id":"VCID-7ufs-uvgd-v3ht","summary":"php: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)","references":[{"reference_url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834","reference_id":"","reference_type":"","scores":[],"url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382","reference_id":"","reference_type":"","scores":[{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1537","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/04/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/08/04/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76157","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225","reference_id":"1187225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589","reference_id":"794589","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382","reference_id":"CVE-2015-8382","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8382"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ufs-uvgd-v3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34914?format=json","vulnerability_id":"VCID-7vb2-byp7-uyb3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394","reference_id":"","reference_type":"","scores":[{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702","reference_id":"1287702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394","reference_id":"CVE-2015-8394","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8394"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vb2-byp7-uyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34904?format=json","vulnerability_id":"VCID-a952-adu8-8qfx","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385","reference_id":"","reference_type":"","scores":[{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85572","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85572"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629","reference_id":"1287629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385","reference_id":"CVE-2015-8385","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8385"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34909?format=json","vulnerability_id":"VCID-cbu7-jb3m-nbf2","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389","reference_id":"","reference_type":"","scores":[{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.8577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659","reference_id":"1287659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389","reference_id":"CVE-2015-8389","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8389"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbu7-jb3m-nbf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34911?format=json","vulnerability_id":"VCID-dfts-4w3d-huc3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391","reference_id":"","reference_type":"","scores":[{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671","reference_id":"1287671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391","reference_id":"CVE-2015-8391","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8391"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81166?format=json","vulnerability_id":"VCID-eupp-h1mx-13dy","summary":"pcre: Integer overflow when parsing callout numeric arguments","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14155","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45809","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45783","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14155"},{"reference_url":"https://bugs.gentoo.org/717920","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.gentoo.org/717920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.pcre.org/original/changelog.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.pcre.org/original/changelog.txt"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848436","reference_id":"1848436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848436"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086","reference_id":"963086","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14155","reference_id":"CVE-2020-14155","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4373","reference_id":"RHSA-2021:4373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4613","reference_id":"RHSA-2021:4613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4614","reference_id":"RHSA-2021:4614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4614"},{"reference_url":"https://usn.ubuntu.com/5425-1/","reference_id":"USN-5425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5425-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1057348?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13"}],"aliases":["CVE-2020-14155"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eupp-h1mx-13dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7606?format=json","vulnerability_id":"VCID-jkr1-gvjw-wkcx","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nHeap-based buffer overflow in PCRE and PCRE2 allows remote attackers to execute arbitrary code via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210","reference_id":"","reference_type":"","scores":[{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90448","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433","reference_id":"787433","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210","reference_id":"CVE-2015-3210","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-3210"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkr1-gvjw-wkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34905?format=json","vulnerability_id":"VCID-kwfj-9bb2-dqcb","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386","reference_id":"","reference_type":"","scores":[{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636","reference_id":"1287636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386","reference_id":"CVE-2015-8386","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8386"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58170?format=json","vulnerability_id":"VCID-m72x-pqy7-myg3","summary":"A vulnerability in PCRE library allows remote attackers to cause a\n    Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6004","reference_id":"","reference_type":"","scores":[{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.8856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88564","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425365","reference_id":"1425365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425365"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405","reference_id":"855405","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405"},{"reference_url":"https://security.gentoo.org/glsa/201706-11","reference_id":"GLSA-201706-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-11"},{"reference_url":"https://usn.ubuntu.com/5665-1/","reference_id":"USN-5665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1057346?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-eupp-h1mx-13dy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3"}],"aliases":["CVE-2017-6004"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m72x-pqy7-myg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85752?format=json","vulnerability_id":"VCID-mfmv-rw7p-rqbe","summary":"pcre: heap buffer overflow in compile_branch()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58125","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198","reference_id":"1207198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795","reference_id":"781795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-2325"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfmv-rw7p-rqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34910?format=json","vulnerability_id":"VCID-mnr6-xgc9-xucz","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390","reference_id":"","reference_type":"","scores":[{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666","reference_id":"1287666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390","reference_id":"CVE-2015-8390","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8390"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnr6-xgc9-xucz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86205?format=json","vulnerability_id":"VCID-mq83-9qaf-ffgc","summary":"pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327","reference_id":"","reference_type":"","scores":[{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8616","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1503","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-010/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-010/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408","reference_id":"1285408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327","reference_id":"CVE-2015-2327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-2327"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq83-9qaf-ffgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7607?format=json","vulnerability_id":"VCID-pejf-33ba-h3c1","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nPCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217","reference_id":"","reference_type":"","scores":[{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283","reference_id":"1228283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641","reference_id":"787641","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217","reference_id":"CVE-2015-3217","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-3217"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34901?format=json","vulnerability_id":"VCID-tx1n-v7bn-7uhw","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381","reference_id":"","reference_type":"","scores":[{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9052","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1667","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1667"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1672","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539","reference_id":"795539","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381","reference_id":"CVE-2015-8381","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8381"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7327?format=json","vulnerability_id":"VCID-udse-25e2-vfeb","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nThe compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3191","reference_id":"","reference_type":"","scores":[{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93526","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3191"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.debian.org/815920","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/815920"},{"reference_url":"https://bugs.debian.org/815921","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/815921"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1791","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.tenable.com/security/tns-2016-18","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-18"},{"reference_url":"http://vcs.pcre.org/pcre2?view=revision&revision=489","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre2?view=revision&revision=489"},{"reference_url":"http://vcs.pcre.org/pcre?view=revision&revision=1631","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre?view=revision&revision=1631"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/84810","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311503","reference_id":"1311503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311503"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920","reference_id":"815920","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921","reference_id":"815921","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3191","reference_id":"CVE-2016-3191","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2016-3191"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udse-25e2-vfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34899?format=json","vulnerability_id":"VCID-va26-j6rt-buab","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380","reference_id":"","reference_type":"","scores":[{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380"},{"reference_url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html","reference_id":"","reference_type":"","scores":[],"url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1637","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/77695","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413","reference_id":"1285413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467","reference_id":"806467","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380","reference_id":"CVE-2015-8380","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8380"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-va26-j6rt-buab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86176?format=json","vulnerability_id":"VCID-vjaf-nq1r-e3bm","summary":"pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328","reference_id":"","reference_type":"","scores":[{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85915","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1515","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-014/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-014/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399","reference_id":"1285399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328","reference_id":"CVE-2015-2328","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-2328"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjaf-nq1r-e3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34903?format=json","vulnerability_id":"VCID-wx7q-7bp6-bybq","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384","reference_id":"","reference_type":"","scores":[{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.788","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78857","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384","reference_id":"CVE-2015-8384","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8384"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7q-7bp6-bybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85285?format=json","vulnerability_id":"VCID-xwr2-6zpb-x7cn","summary":"pcre: incorrect nested table jumps when JIT is used (8.36/6)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769","reference_id":"","reference_type":"","scores":[{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769"},{"reference_url":"https://bugs.debian.org/819050","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/819050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769"},{"reference_url":"https://redmine.openinfosecfoundation.org/issues/1693","reference_id":"","reference_type":"","scores":[],"url":"https://redmine.openinfosecfoundation.org/issues/1693"},{"reference_url":"http://vcs.pcre.org/pcre?view=revision&revision=1475","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre?view=revision&revision=1475"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/26/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/26/1"},{"reference_url":"http://www.securityfocus.com/bid/85570","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85570"},{"reference_url":"http://www.securitytracker.com/id/1035424","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995","reference_id":"1320995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050","reference_id":"819050","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769","reference_id":"CVE-2014-9769","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2014-9769"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwr2-6zpb-x7cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7854?format=json","vulnerability_id":"VCID-ywee-ghvk-pubu","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nlibpcre1 in PCRE and libpcre2 in PCRE2 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7186","reference_id":"","reference_type":"","scores":[{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91528","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91501","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7186"},{"reference_url":"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=2052","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=2052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"},{"reference_url":"http://www.securityfocus.com/bid/97030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97030"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434504","reference_id":"1434504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434504"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230","reference_id":"858230","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233","reference_id":"858233","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233"},{"reference_url":"https://security.archlinux.org/ASA-201707-20","reference_id":"ASA-201707-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-20"},{"reference_url":"https://security.archlinux.org/ASA-201710-18","reference_id":"ASA-201710-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-18"},{"reference_url":"https://security.archlinux.org/AVG-222","reference_id":"AVG-222","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-222"},{"reference_url":"https://security.archlinux.org/AVG-223","reference_id":"AVG-223","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-223"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7186","reference_id":"CVE-2017-7186","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7186"},{"reference_url":"https://security.gentoo.org/glsa/201710-09","reference_id":"GLSA-201710-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-25","reference_id":"GLSA-201710-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-25"},{"reference_url":"https://usn.ubuntu.com/5665-1/","reference_id":"USN-5665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1057346?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-eupp-h1mx-13dy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3"}],"aliases":["CVE-2017-7186"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ywee-ghvk-pubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34902?format=json","vulnerability_id":"VCID-yztb-bavc-kkgt","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383","reference_id":"","reference_type":"","scores":[{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.8483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614","reference_id":"1287614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383","reference_id":"CVE-2015-8383","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-8383"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85753?format=json","vulnerability_id":"VCID-zjgd-f5nj-zybz","summary":"pcre: heap buffer over-read in pcre_compile2() (8.37/23)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326","reference_id":"","reference_type":"","scores":[{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68602","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202","reference_id":"1207202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285","reference_id":"783285","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050710?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7386-q1qx-2fgr"},{"vulnerability":"VCID-eupp-h1mx-13dy"},{"vulnerability":"VCID-m72x-pqy7-myg3"},{"vulnerability":"VCID-ywee-ghvk-pubu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-1"}],"aliases":["CVE-2015-2326"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjgd-f5nj-zybz"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@8.02-1.1%252Bdeb6u1"}