Lookup for vulnerable packages by Package URL.

GET /api/packages/934555?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
    "type": "deb",
    "namespace": "debian",
    "name": "pcre3",
    "version": "2:8.39-15",
    "qualifiers": {
        "distro": "bullseye"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34908?format=api",
            "vulnerability_id": "VCID-1rdp-4637-tfh7",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88701",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88689",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88695",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.887",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8388"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/85576"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237223",
                    "reference_id": "1237223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237223"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8388",
                    "reference_id": "CVE-2015-8388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8388"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934567?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8388"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rdp-4637-tfh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51938?format=api",
            "vulnerability_id": "VCID-1z8y-cqmn-s7gc",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90024",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90039",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90043",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90059",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90073",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90071",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90065",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1659"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=315871",
                    "reference_id": "315871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=315871"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0967",
                    "reference_id": "RHSA-2007:0967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0967"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1068",
                    "reference_id": "RHSA-2007:1068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1068"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-1659"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8y-cqmn-s7gc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51944?format=api",
            "vulnerability_id": "VCID-2dcv-wbjk-tqh8",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83412",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83426",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8344",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83439",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83464",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83473",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83477",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4767"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=392901",
                    "reference_id": "392901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392901"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-4767"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcv-wbjk-tqh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34906?format=api",
            "vulnerability_id": "VCID-3a9g-pj5j-nbbc",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80753",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80762",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80707",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80728",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80761",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80777",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8387"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287646",
                    "reference_id": "1287646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287646"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8387",
                    "reference_id": "CVE-2015-8387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8387"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8387"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3a9g-pj5j-nbbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34916?format=api",
            "vulnerability_id": "VCID-3vg3-y6dk-n3ag",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85373",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85368",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0251",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85371",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86428",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86456",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88006",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87983",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1283"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1767"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2016-18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.tenable.com/security/tns-2016-18"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2017-14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.tenable.com/security/tns-2017-14"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79825"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034555",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034555"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295385",
                    "reference_id": "1295385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295385"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706",
                    "reference_id": "809706",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1283",
                    "reference_id": "CVE-2016-1283",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1283"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934568?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-3.1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-3.1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2016-1283"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vg3-y6dk-n3ag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34896?format=api",
            "vulnerability_id": "VCID-3wxw-5hsh-tqhj",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67796",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6783",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6785",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6788",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67894",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67917",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67904",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00547",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67868",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237223",
                    "reference_id": "1237223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237223"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000",
                    "reference_id": "790000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2694-1/",
                    "reference_id": "USN-2694-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2694-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934567?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-5073"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3wxw-5hsh-tqhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34912?format=api",
            "vulnerability_id": "VCID-4kzr-datq-bbcp",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88966",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88996",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8392"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287690",
                    "reference_id": "1287690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287690"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8392",
                    "reference_id": "CVE-2015-8392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8392"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34913?format=api",
            "vulnerability_id": "VCID-52he-28zb-z7bj",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72375",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72328",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72329",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72368",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72403",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8393"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287695",
                    "reference_id": "1287695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287695"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8393",
                    "reference_id": "CVE-2015-8393",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8393"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8393"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52he-28zb-z7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34915?format=api",
            "vulnerability_id": "VCID-5vhs-7ffz-rkaf",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85075",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85035",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85057",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8508",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85079",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8395"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711",
                    "reference_id": "1287711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8395",
                    "reference_id": "CVE-2015-8395",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8395"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8395"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40861?format=api",
            "vulnerability_id": "VCID-6dhr-bpqk-gfds",
            "summary": "A buffer overflow vulnerability has been discovered in PCRE, allowing for\n    the execution of arbitrary code and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=228091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.gentoo.org/show_bug.cgi?id=228091"
                },
                {
                    "reference_url": "http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88641",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88586",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88595",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88632",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88637",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88649",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30916"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30944"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30945"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30958",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30958"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30961"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30972"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30990"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31200"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32222"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32454"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32746"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35074"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35650",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35650"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39300"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200811-05.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200811-05.xml"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3216"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3549"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html"
                },
                {
                    "reference_url": "http://ubuntu.com/usn/usn-624-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://ubuntu.com/usn/usn-624-2"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1602"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:147"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/497828/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/497828/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30087"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/31681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/31681"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-624-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-624-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-628-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-628-1"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2005"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2006"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2336"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2780"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1297"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/0833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/0833"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=452079",
                    "reference_id": "452079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452079"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919",
                    "reference_id": "488919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2371",
                    "reference_id": "CVE-2008-2371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2371"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200807-03",
                    "reference_id": "GLSA-200807-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200807-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200811-05",
                    "reference_id": "GLSA-200811-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200811-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/624-1/",
                    "reference_id": "USN-624-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/624-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/624-2/",
                    "reference_id": "USN-624-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/624-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/628-1/",
                    "reference_id": "USN-628-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/628-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934563?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.6-2.1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.6-2.1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2008-2371"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhr-bpqk-gfds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62237?format=api",
            "vulnerability_id": "VCID-7386-q1qx-2fgr",
            "summary": "Multiple vulnerabilities have been found in the PCRE Library, the\n    worst of which may allow remote attackers to cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2486"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6696",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67045",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67077",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67063",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66997",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66996",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7244"
                },
                {
                    "reference_url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97067"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364",
                    "reference_id": "1437364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683",
                    "reference_id": "858683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201707-20",
                    "reference_id": "ASA-201707-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201707-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-222",
                    "reference_id": "AVG-222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-222"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244",
                    "reference_id": "CVE-2017-7244",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-25",
                    "reference_id": "GLSA-201710-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201710-25"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934571?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-3?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2017-7244"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7386-q1qx-2fgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34895?format=api",
            "vulnerability_id": "VCID-79s2-s1sx-3uag",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0534.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0534.html"
                },
                {
                    "reference_url": "http://bugs.exim.org/show_bug.cgi?id=1546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.exim.org/show_bug.cgi?id=1546"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0330.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0330.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8964",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8389",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83894",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83823",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83837",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83877",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.839",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8964"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.exim.org/viewvc/pcre?view=revision&revision=1513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.exim.org/viewvc/pcre?view=revision&revision=1513"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/11/21/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/11/21/6"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/71206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/71206"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166147",
                    "reference_id": "1166147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166147"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478",
                    "reference_id": "770478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8964",
                    "reference_id": "CVE-2014-8964",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8964"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0330",
                    "reference_id": "RHSA-2015:0330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0330"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2694-1/",
                    "reference_id": "USN-2694-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2694-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934564?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-3.3?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-3.3%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2014-8964"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79s2-s1sx-3uag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85857?format=api",
            "vulnerability_id": "VCID-7ufs-uvgd-v3ht",
            "summary": "php: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)",
            "references": [
                {
                    "reference_url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82654",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82587",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82639",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82647",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01772",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82659",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8382"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/08/04/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/08/04/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76157"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187225",
                    "reference_id": "1187225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187225"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589",
                    "reference_id": "794589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8382",
                    "reference_id": "CVE-2015-8382",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8382"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8382"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ufs-uvgd-v3ht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34914?format=api",
            "vulnerability_id": "VCID-7vb2-byp7-uyb3",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83139",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83144",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83072",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83089",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83133",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83149",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8394"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287702",
                    "reference_id": "1287702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287702"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8394",
                    "reference_id": "CVE-2015-8394",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8394"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8394"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vb2-byp7-uyb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33673?format=api",
            "vulnerability_id": "VCID-89gs-mhbc-dyda",
            "summary": "A buffer overflow vulnerability has been discovered in PCRE, allowing for\n    the execution of arbitrary code and Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95601",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9561",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95615",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95629",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95635",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95637",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0674"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431660",
                    "reference_id": "431660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431660"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200803-24",
                    "reference_id": "GLSA-200803-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200803-24"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200811-05",
                    "reference_id": "GLSA-200811-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200811-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/581-1/",
                    "reference_id": "USN-581-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/581-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934562?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.6-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.6-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2008-0674"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89gs-mhbc-dyda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34904?format=api",
            "vulnerability_id": "VCID-a952-adu8-8qfx",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89876",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89835",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89838",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89873",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89879",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89885",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89883",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8385"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85572",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/85572"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287629",
                    "reference_id": "1287629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287629"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8385",
                    "reference_id": "CVE-2015-8385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8385"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51936?format=api",
            "vulnerability_id": "VCID-aunn-rnwm-1fhe",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7228.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7228.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84219",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84237",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84238",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8426",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84267",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84279",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84276",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7228"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371",
                    "reference_id": "383371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200802-10",
                    "reference_id": "GLSA-200802-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200802-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1059",
                    "reference_id": "RHSA-2007:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1063",
                    "reference_id": "RHSA-2007:1063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1063"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1065",
                    "reference_id": "RHSA-2007:1065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1068",
                    "reference_id": "RHSA-2007:1068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1068"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1076",
                    "reference_id": "RHSA-2007:1076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1076"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1077",
                    "reference_id": "RHSA-2007:1077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0546",
                    "reference_id": "RHSA-2008:0546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0546"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934558?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.2-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2006-7228"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aunn-rnwm-1fhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51937?format=api",
            "vulnerability_id": "VCID-bz2h-8zx3-fffy",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7230.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7230.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86005",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86033",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86062",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86076",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86069",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7230"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=384801",
                    "reference_id": "384801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=384801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1059",
                    "reference_id": "RHSA-2007:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1068",
                    "reference_id": "RHSA-2007:1068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1068"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934560?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.0-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.0-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2006-7230"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz2h-8zx3-fffy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34909?format=api",
            "vulnerability_id": "VCID-cbu7-jb3m-nbf2",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85704",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85722",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85748",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85773",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8389"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287659",
                    "reference_id": "1287659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287659"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8389",
                    "reference_id": "CVE-2015-8389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8389"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8389"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbu7-jb3m-nbf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51940?format=api",
            "vulnerability_id": "VCID-cs49-wfxj-j3ba",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83758",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83775",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83805",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8381",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=392931",
                    "reference_id": "392931",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392931"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-1661"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cs49-wfxj-j3ba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34911?format=api",
            "vulnerability_id": "VCID-dfts-4w3d-huc3",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91037",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90986",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90991",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8391"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287671",
                    "reference_id": "1287671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287671"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8391",
                    "reference_id": "CVE-2015-8391",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8391"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8391"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49244?format=api",
            "vulnerability_id": "VCID-dqaf-8bt4-e7b2",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92852",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92863",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92861",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92869",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92878",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4768"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=392911",
                    "reference_id": "392911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392911"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200801-07",
                    "reference_id": "GLSA-200801-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200801-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1126",
                    "reference_id": "RHSA-2007:1126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-4768"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqaf-8bt4-e7b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81166?format=api",
            "vulnerability_id": "VCID-eupp-h1mx-13dy",
            "summary": "pcre: Integer overflow when parsing callout numeric arguments",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45693",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45762",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45784",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45732",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4579",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45786",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45809",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45783",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14155"
                },
                {
                    "reference_url": "https://bugs.gentoo.org/717920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.gentoo.org/717920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.pcre.org/original/changelog.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.pcre.org/original/changelog.txt"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436",
                    "reference_id": "1848436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086",
                    "reference_id": "963086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155",
                    "reference_id": "CVE-2020-14155",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4373",
                    "reference_id": "RHSA-2021:4373",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4373"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4613",
                    "reference_id": "RHSA-2021:4613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4613"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4614",
                    "reference_id": "RHSA-2021:4614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4614"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5425-1/",
                    "reference_id": "USN-5425-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5425-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14155"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eupp-h1mx-13dy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7606?format=api",
            "vulnerability_id": "VCID-jkr1-gvjw-wkcx",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nHeap-based buffer overflow in PCRE and PCRE2 allows remote attackers to execute arbitrary code via a crafted regular expression.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90401",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90416",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90434",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9044",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90448",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3210"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287623",
                    "reference_id": "1287623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287623"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433",
                    "reference_id": "787433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3210",
                    "reference_id": "CVE-2015-3210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3210"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2694-1/",
                    "reference_id": "USN-2694-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2694-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-3210"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jkr1-gvjw-wkcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34905?format=api",
            "vulnerability_id": "VCID-kwfj-9bb2-dqcb",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9181",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91814",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91768",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91776",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91782",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91803",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91812",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8386"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287636",
                    "reference_id": "1287636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287636"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8386",
                    "reference_id": "CVE-2015-8386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8386"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8386"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58170?format=api",
            "vulnerability_id": "VCID-m72x-pqy7-myg3",
            "summary": "A vulnerability in PCRE library allows remote attackers to cause a\n    Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88508",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88515",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88555",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88563",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88564",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365",
                    "reference_id": "1425365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405",
                    "reference_id": "855405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-11",
                    "reference_id": "GLSA-201706-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5665-1/",
                    "reference_id": "USN-5665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5665-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934570?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-2.1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-2.1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2017-6004"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m72x-pqy7-myg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85752?format=api",
            "vulnerability_id": "VCID-mfmv-rw7p-rqbe",
            "summary": "pcre: heap buffer overflow in compile_branch()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58099",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58153",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58145",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58125",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207198",
                    "reference_id": "1207198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207198"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795",
                    "reference_id": "781795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2694-1/",
                    "reference_id": "USN-2694-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2694-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-2325"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfmv-rw7p-rqbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51942?format=api",
            "vulnerability_id": "VCID-mha6-j74w-wudp",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88488",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88516",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88551",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88543",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1662"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=392921",
                    "reference_id": "392921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392921"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-1662"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mha6-j74w-wudp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34910?format=api",
            "vulnerability_id": "VCID-mnr6-xgc9-xucz",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86269",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86231",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8625",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86276",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8390"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82990"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287666",
                    "reference_id": "1287666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287666"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8390",
                    "reference_id": "CVE-2015-8390",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8390"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8390"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnr6-xgc9-xucz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86205?format=api",
            "vulnerability_id": "VCID-mq83-9qaf-ffgc",
            "summary": "pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19)",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8609",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.861",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02821",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8616",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2327"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327"
                },
                {
                    "reference_url": "https://jira.mongodb.org/browse/SERVER-17252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://jira.mongodb.org/browse/SERVER-17252"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.fortiguard.com/advisory/FG-VD-15-010/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.fortiguard.com/advisory/FG-VD-15-010/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/74924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/74924"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285408",
                    "reference_id": "1285408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285408"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2327",
                    "reference_id": "CVE-2015-2327",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-2327"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mq83-9qaf-ffgc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7607?format=api",
            "vulnerability_id": "VCID-pejf-33ba-h3c1",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nPCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75005",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75037",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75013",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75047",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75059",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75081",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7506",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75049",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3217"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228283",
                    "reference_id": "1228283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228283"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641",
                    "reference_id": "787641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3217",
                    "reference_id": "CVE-2015-3217",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3217"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-3217"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51935?format=api",
            "vulnerability_id": "VCID-rdk3-3cmd-vkbg",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7227.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7227.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84717",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84732",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84751",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84754",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84777",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84783",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84801",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84797",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84792",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7227"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=383341",
                    "reference_id": "383341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383341"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1052",
                    "reference_id": "RHSA-2007:1052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1052"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934558?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.2-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2006-7227"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdk3-3cmd-vkbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88599?format=api",
            "vulnerability_id": "VCID-sue7-e3bs-tuep",
            "summary": "pcre miscalculation of memory requirements for malformed Posix character class",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79656",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79685",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79692",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7969",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=384761",
                    "reference_id": "384761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=384761"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1059",
                    "reference_id": "RHSA-2007:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1068",
                    "reference_id": "RHSA-2007:1068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1068"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934559?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.7-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.7-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2006-7225"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sue7-e3bs-tuep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51939?format=api",
            "vulnerability_id": "VCID-sy5p-ju6m-vbgp",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.903",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90303",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90315",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90334",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90349",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05628",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90342",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=315881",
                    "reference_id": "315881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=315881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0967",
                    "reference_id": "RHSA-2007:0967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0967"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0968",
                    "reference_id": "RHSA-2007:0968",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0968"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1063",
                    "reference_id": "RHSA-2007:1063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1063"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1065",
                    "reference_id": "RHSA-2007:1065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0546",
                    "reference_id": "RHSA-2008:0546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0546"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-1660"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sy5p-ju6m-vbgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34901?format=api",
            "vulnerability_id": "VCID-tx1n-v7bn-7uhw",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90472",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90476",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90487",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90493",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90505",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90511",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9052",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8381"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1667"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711",
                    "reference_id": "1287711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287711"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539",
                    "reference_id": "795539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8381",
                    "reference_id": "CVE-2015-8381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8381"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8381"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7327?format=api",
            "vulnerability_id": "VCID-udse-25e2-vfeb",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nThe compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93543",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93537",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93509",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93518",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93526",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3191"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.debian.org/815920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/815920"
                },
                {
                    "reference_url": "https://bugs.debian.org/815921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/815921"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1791"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2016-18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.tenable.com/security/tns-2016-18"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre2?view=revision&revision=489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre2?view=revision&revision=489"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre?view=revision&revision=1631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre?view=revision&revision=1631"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/84810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/84810"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311503",
                    "reference_id": "1311503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311503"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920",
                    "reference_id": "815920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921",
                    "reference_id": "815921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3191",
                    "reference_id": "CVE-2016-3191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934569?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2016-3191"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-udse-25e2-vfeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3682?format=api",
            "vulnerability_id": "VCID-v2g6-h93b-euer",
            "summary": "An integer overflow flaw was found in PCRE, a Perl-compatible regular expression library included within httpd. A local user who has the ability to create .htaccess files could create a maliciously crafted regular expression in such as way that they could gain the privileges of a httpd child.",
            "references": [
                {
                    "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
                },
                {
                    "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
                },
                {
                    "reference_url": "http://docs.info.apple.com/article.html?artnum=302847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://docs.info.apple.com/article.html?artnum=302847"
                },
                {
                    "reference_url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522"
                },
                {
                    "reference_url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=112606064317223&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=112606064317223&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83635",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83647",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8364",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83569",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83596",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83598",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8363",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2491"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491"
                },
                {
                    "reference_url": "http://secunia.com/advisories/16502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/16502"
                },
                {
                    "reference_url": "http://secunia.com/advisories/16679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/16679"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17252"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17813"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19072"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19532"
                },
                {
                    "reference_url": "http://secunia.com/advisories/21522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/21522"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22691"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22875"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/604"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1014744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1014744"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-800"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-817"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-819"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-821"
                },
                {
                    "reference_url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_48_pcre.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_48_pcre.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_49_php.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_49_php.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_52_apache2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_52_apache2.html"
                },
                {
                    "reference_url": "http://www.php.net/release_4_4_1.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.php.net/release_4_4_1.php"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-358.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-358.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-761.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-761.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0197.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2006-0197.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/427046/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/427046/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428138/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428138/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/14620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/14620"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15647"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/1511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/1511"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2659"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/0789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/0789"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/4320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/4320"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/4502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/4502"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324531",
                    "reference_id": "324531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324531"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326628",
                    "reference_id": "326628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326628"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326898",
                    "reference_id": "326898",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326898"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=430638",
                    "reference_id": "430638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430638"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://httpd.apache.org/security/json/CVE-2005-2491.json",
                    "reference_id": "CVE-2005-2491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "apache_httpd",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://httpd.apache.org/security/json/CVE-2005-2491.json"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2491",
                    "reference_id": "CVE-2005-2491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:358",
                    "reference_id": "RHSA-2005:358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:358"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:761",
                    "reference_id": "RHSA-2005:761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:761"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0197",
                    "reference_id": "RHSA-2006:0197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0197"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/173-1/",
                    "reference_id": "USN-173-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/173-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/173-2/",
                    "reference_id": "USN-173-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/173-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/173-4/",
                    "reference_id": "USN-173-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/173-4/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934556?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2005-2491"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v2g6-h93b-euer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34899?format=api",
            "vulnerability_id": "VCID-va26-j6rt-buab",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79173",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79179",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79189",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79214",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79222",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7923",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8380"
                },
                {
                    "reference_url": "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77695"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285413",
                    "reference_id": "1285413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285413"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467",
                    "reference_id": "806467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8380",
                    "reference_id": "CVE-2015-8380",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8380"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8380"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-va26-j6rt-buab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86176?format=api",
            "vulnerability_id": "VCID-vjaf-nq1r-e3bm",
            "summary": "pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85921",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85853",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85886",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85905",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85929",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85926",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2328"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=1515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=1515"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328"
                },
                {
                    "reference_url": "https://jira.mongodb.org/browse/SERVER-17252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://jira.mongodb.org/browse/SERVER-17252"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"
                },
                {
                    "reference_url": "http://www.fortiguard.com/advisory/FG-VD-15-014/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.fortiguard.com/advisory/FG-VD-15-014/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/74924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/74924"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285399",
                    "reference_id": "1285399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285399"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2328",
                    "reference_id": "CVE-2015-2328",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2328"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1025",
                    "reference_id": "RHSA-2016:1025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1025"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-2328"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjaf-nq1r-e3bm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51943?format=api",
            "vulnerability_id": "VCID-vrjs-v8f3-s3d7",
            "summary": "PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88154",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88162",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88204",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8821",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88221",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88213",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4766"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=392891",
                    "reference_id": "392891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392891"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-30",
                    "reference_id": "GLSA-200711-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-30"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/547-1/",
                    "reference_id": "USN-547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/547-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934561?format=api",
                    "purl": "pkg:deb/debian/pcre3@7.3-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2007-4766"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vrjs-v8f3-s3d7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88600?format=api",
            "vulnerability_id": "VCID-wj2d-k1ha-pqgd",
            "summary": "pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.824",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82396",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82391",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7226"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=384781",
                    "reference_id": "384781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=384781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1059",
                    "reference_id": "RHSA-2007:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1068",
                    "reference_id": "RHSA-2007:1068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1068"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934559?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.7-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.7-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2006-7226"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj2d-k1ha-pqgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34903?format=api",
            "vulnerability_id": "VCID-wx7q-7bp6-bybq",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78848",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.788",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78807",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78836",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78819",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78845",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78857",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8384"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287623",
                    "reference_id": "1287623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287623"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8384",
                    "reference_id": "CVE-2015-8384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8384"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8384"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7q-7bp6-bybq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85285?format=api",
            "vulnerability_id": "VCID-xwr2-6zpb-x7cn",
            "summary": "pcre: incorrect nested table jumps when JIT is used (8.36/6)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76085",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76145",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00934",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76171",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9769"
                },
                {
                    "reference_url": "https://bugs.debian.org/819050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/819050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769"
                },
                {
                    "reference_url": "https://redmine.openinfosecfoundation.org/issues/1693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://redmine.openinfosecfoundation.org/issues/1693"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre?view=revision&revision=1475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre?view=revision&revision=1475"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/26/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/03/26/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/85570"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035424"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320995",
                    "reference_id": "1320995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320995"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050",
                    "reference_id": "819050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9769",
                    "reference_id": "CVE-2014-9769",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9769"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2014-9769"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwr2-6zpb-x7cn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7854?format=api",
            "vulnerability_id": "VCID-ywee-ghvk-pubu",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nlibpcre1 in PCRE and libpcre2 in PCRE2 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2486"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91487",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91532",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91522",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91528",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91533",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91534",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91501",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7186"
                },
                {
                    "reference_url": "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"
                },
                {
                    "reference_url": "https://bugs.exim.org/show_bug.cgi?id=2052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.exim.org/show_bug.cgi?id=2052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"
                },
                {
                    "reference_url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"
                },
                {
                    "reference_url": "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"
                },
                {
                    "reference_url": "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97030"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504",
                    "reference_id": "1434504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230",
                    "reference_id": "858230",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233",
                    "reference_id": "858233",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201707-20",
                    "reference_id": "ASA-201707-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201707-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-18",
                    "reference_id": "ASA-201710-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-222",
                    "reference_id": "AVG-222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-222"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-223",
                    "reference_id": "AVG-223",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-223"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186",
                    "reference_id": "CVE-2017-7186",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-09",
                    "reference_id": "GLSA-201710-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201710-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-25",
                    "reference_id": "GLSA-201710-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201710-25"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5665-1/",
                    "reference_id": "USN-5665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5665-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934571?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-3?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2017-7186"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ywee-ghvk-pubu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34902?format=api",
            "vulnerability_id": "VCID-yztb-bavc-kkgt",
            "summary": "Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84846",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84851",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84771",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84786",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84806",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84807",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8483",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84836",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8383"
                },
                {
                    "reference_url": "https://bto.bluecoat.com/security-advisory/sa128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bto.bluecoat.com/security-advisory/sa128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0002/"
                },
                {
                    "reference_url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287614",
                    "reference_id": "1287614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287614"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8383",
                    "reference_id": "CVE-2015-8383",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8383"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-02",
                    "reference_id": "GLSA-201607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1132",
                    "reference_id": "RHSA-2016:1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934565?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-8383"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88610?format=api",
            "vulnerability_id": "VCID-zejr-2fgr-hydx",
            "summary": "pcre incorrect memory requirement computation",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4872.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4872.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81023",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80993",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80992",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8102",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81044",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81031",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4872"
                },
                {
                    "reference_url": "http://scary.beasts.org/security/CESA-2007-006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://scary.beasts.org/security/CESA-2007-006.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27582"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27773"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27869"
                },
                {
                    "reference_url": "http://secunia.com/advisories/28658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/28658"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
                },
                {
                    "reference_url": "http://www.pcre.org/changelog.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pcre.org/changelog.txt"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-1052.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-1052.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/26462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/26462"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=383361",
                    "reference_id": "383361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383361"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4872",
                    "reference_id": "CVE-2005-4872",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4872"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1052",
                    "reference_id": "RHSA-2007:1052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1052"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934558?format=api",
                    "purl": "pkg:deb/debian/pcre3@6.2-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2005-4872"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zejr-2fgr-hydx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85753?format=api",
            "vulnerability_id": "VCID-zjgd-f5nj-zybz",
            "summary": "pcre: heap buffer over-read in pcre_compile2() (8.37/23)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68572",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68505",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68523",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6852",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68571",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68589",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68615",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68602",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2326"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207202",
                    "reference_id": "1207202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207202"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285",
                    "reference_id": "783285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750",
                    "reference_id": "RHSA-2016:2750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2750"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2694-1/",
                    "reference_id": "USN-2694-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2694-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2943-1/",
                    "reference_id": "USN-2943-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2943-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934566?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934557?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934555?format=api",
                    "purl": "pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2015-2326"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjgd-f5nj-zybz"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"
}