{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","type":"deb","namespace":"debian","name":"pcre3","version":"2:8.39-15","qualifiers":{"distro":"bullseye"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34908?format=json","vulnerability_id":"VCID-1rdp-4637-tfh7","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8388","reference_id":"","reference_type":"","scores":[{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88701","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.88707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04176","scoring_system":"epss","scoring_elements":"0.887","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8388"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223","reference_id":"1237223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388","reference_id":"CVE-2015-8388","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934567?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8388"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rdp-4637-tfh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51938?format=json","vulnerability_id":"VCID-1z8y-cqmn-s7gc","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1659","reference_id":"","reference_type":"","scores":[{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90059","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05344","scoring_system":"epss","scoring_elements":"0.90065","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=315871","reference_id":"315871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=315871"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0967","reference_id":"RHSA-2007:0967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1068","reference_id":"RHSA-2007:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1068"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-1659"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8y-cqmn-s7gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51944?format=json","vulnerability_id":"VCID-2dcv-wbjk-tqh8","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4767","reference_id":"","reference_type":"","scores":[{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.8344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01955","scoring_system":"epss","scoring_elements":"0.83477","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392901","reference_id":"392901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392901"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-4767"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcv-wbjk-tqh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34906?format=json","vulnerability_id":"VCID-3a9g-pj5j-nbbc","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387","reference_id":"","reference_type":"","scores":[{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646","reference_id":"1287646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387","reference_id":"CVE-2015-8387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8387"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3a9g-pj5j-nbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34916?format=json","vulnerability_id":"VCID-3vg3-y6dk-n3ag","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1283","reference_id":"","reference_type":"","scores":[{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02952","scoring_system":"epss","scoring_elements":"0.86456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.87992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.88006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03762","scoring_system":"epss","scoring_elements":"0.87983","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1283"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1767","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283"},{"reference_url":"https://www.tenable.com/security/tns-2016-18","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-18"},{"reference_url":"https://www.tenable.com/security/tns-2017-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-14"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securityfocus.com/bid/79825","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79825"},{"reference_url":"http://www.securitytracker.com/id/1034555","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034555"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1295385","reference_id":"1295385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1295385"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706","reference_id":"809706","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1283","reference_id":"CVE-2016-1283","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1283"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934568?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-3.1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-3.1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2016-1283"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vg3-y6dk-n3ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34896?format=json","vulnerability_id":"VCID-3wxw-5hsh-tqhj","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5073","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67868","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223","reference_id":"1237223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000","reference_id":"790000","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934567?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-5073"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wxw-5hsh-tqhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34912?format=json","vulnerability_id":"VCID-4kzr-datq-bbcp","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392","reference_id":"","reference_type":"","scores":[{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.8899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89002","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690","reference_id":"1287690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392","reference_id":"CVE-2015-8392","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8392"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34913?format=json","vulnerability_id":"VCID-52he-28zb-z7bj","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393","reference_id":"","reference_type":"","scores":[{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72368","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695","reference_id":"1287695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393","reference_id":"CVE-2015-8393","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8393"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52he-28zb-z7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34915?format=json","vulnerability_id":"VCID-5vhs-7ffz-rkaf","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395","reference_id":"","reference_type":"","scores":[{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85079","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395","reference_id":"CVE-2015-8395","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8395"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40861?format=json","vulnerability_id":"VCID-6dhr-bpqk-gfds","summary":"A buffer overflow vulnerability has been discovered in PCRE, allowing for\n    the execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=228091","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=228091"},{"reference_url":"http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes","reference_id":"","reference_type":"","scores":[],"url":"http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=124654546101607&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=124654546101607&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=125631037611762&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=125631037611762&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2371","reference_id":"","reference_type":"","scores":[{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04128","scoring_system":"epss","scoring_elements":"0.88649","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371"},{"reference_url":"http://secunia.com/advisories/30916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30916"},{"reference_url":"http://secunia.com/advisories/30944","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30944"},{"reference_url":"http://secunia.com/advisories/30945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30945"},{"reference_url":"http://secunia.com/advisories/30958","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30958"},{"reference_url":"http://secunia.com/advisories/30961","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30961"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/30972","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30972"},{"reference_url":"http://secunia.com/advisories/30990","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30990"},{"reference_url":"http://secunia.com/advisories/31200","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31200"},{"reference_url":"http://secunia.com/advisories/32222","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32222"},{"reference_url":"http://secunia.com/advisories/32454","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32454"},{"reference_url":"http://secunia.com/advisories/32746","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32746"},{"reference_url":"http://secunia.com/advisories/35074","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35074"},{"reference_url":"http://secunia.com/advisories/35650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35650"},{"reference_url":"http://secunia.com/advisories/39300","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39300"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200811-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200811-05.xml"},{"reference_url":"http://support.apple.com/kb/HT3216","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3216"},{"reference_url":"http://support.apple.com/kb/HT3549","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3549"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html"},{"reference_url":"http://ubuntu.com/usn/usn-624-2","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-624-2"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305"},{"reference_url":"http://www.debian.org/security/2008/dsa-1602","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1602"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:147","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:147"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:023","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"},{"reference_url":"http://www.securityfocus.com/archive/1/497828/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/497828/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30087","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30087"},{"reference_url":"http://www.securityfocus.com/bid/31681","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31681"},{"reference_url":"http://www.ubuntu.com/usn/usn-624-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-624-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-628-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-628-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2005","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2005"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2006","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2006"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2780","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2780"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1297"},{"reference_url":"http://www.vupen.com/english/advisories/2010/0833","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/0833"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=452079","reference_id":"452079","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=452079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919","reference_id":"488919","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2371","reference_id":"CVE-2008-2371","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2371"},{"reference_url":"https://security.gentoo.org/glsa/200807-03","reference_id":"GLSA-200807-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200807-03"},{"reference_url":"https://security.gentoo.org/glsa/200811-05","reference_id":"GLSA-200811-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200811-05"},{"reference_url":"https://usn.ubuntu.com/624-1/","reference_id":"USN-624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/624-1/"},{"reference_url":"https://usn.ubuntu.com/624-2/","reference_id":"USN-624-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/624-2/"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934563?format=json","purl":"pkg:deb/debian/pcre3@7.6-2.1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.6-2.1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2008-2371"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhr-bpqk-gfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62237?format=json","vulnerability_id":"VCID-7386-q1qx-2fgr","summary":"Multiple vulnerabilities have been found in the PCRE Library, the\n    worst of which may allow remote attackers to cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7244","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67032","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66996","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7244"},{"reference_url":"https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/97067","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97067"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437364","reference_id":"1437364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437364"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683","reference_id":"858683","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858683"},{"reference_url":"https://security.archlinux.org/ASA-201707-20","reference_id":"ASA-201707-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-20"},{"reference_url":"https://security.archlinux.org/AVG-222","reference_id":"AVG-222","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7244","reference_id":"CVE-2017-7244","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7244"},{"reference_url":"https://security.gentoo.org/glsa/201710-25","reference_id":"GLSA-201710-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-25"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934571?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-3?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2017-7244"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7386-q1qx-2fgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34895?format=json","vulnerability_id":"VCID-79s2-s1sx-3uag","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0534.html"},{"reference_url":"http://bugs.exim.org/show_bug.cgi?id=1546","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.exim.org/show_bug.cgi?id=1546"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0330.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0330.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8964","reference_id":"","reference_type":"","scores":[{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.8389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.83884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02057","scoring_system":"epss","scoring_elements":"0.839","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.exim.org/viewvc/pcre?view=revision&revision=1513","reference_id":"","reference_type":"","scores":[],"url":"http://www.exim.org/viewvc/pcre?view=revision&revision=1513"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:002","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:002"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:137"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/21/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/11/21/6"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"reference_url":"http://www.securityfocus.com/bid/71206","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1166147","reference_id":"1166147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1166147"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478","reference_id":"770478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8964","reference_id":"CVE-2014-8964","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8964"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0330","reference_id":"RHSA-2015:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0330"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934564?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-3.3?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-3.3%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2014-8964"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79s2-s1sx-3uag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85857?format=json","vulnerability_id":"VCID-7ufs-uvgd-v3ht","summary":"php: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)","references":[{"reference_url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834","reference_id":"","reference_type":"","scores":[],"url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382","reference_id":"","reference_type":"","scores":[{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1537","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/04/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/08/04/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76157","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225","reference_id":"1187225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589","reference_id":"794589","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382","reference_id":"CVE-2015-8382","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8382"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ufs-uvgd-v3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34914?format=json","vulnerability_id":"VCID-7vb2-byp7-uyb3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394","reference_id":"","reference_type":"","scores":[{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702","reference_id":"1287702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394","reference_id":"CVE-2015-8394","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8394"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vb2-byp7-uyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33673?format=json","vulnerability_id":"VCID-89gs-mhbc-dyda","summary":"A buffer overflow vulnerability has been discovered in PCRE, allowing for\n    the execution of arbitrary code and Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0674","reference_id":"","reference_type":"","scores":[{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.9561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2096","scoring_system":"epss","scoring_elements":"0.95637","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431660","reference_id":"431660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431660"},{"reference_url":"https://security.gentoo.org/glsa/200803-24","reference_id":"GLSA-200803-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-24"},{"reference_url":"https://security.gentoo.org/glsa/200811-05","reference_id":"GLSA-200811-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200811-05"},{"reference_url":"https://usn.ubuntu.com/581-1/","reference_id":"USN-581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934562?format=json","purl":"pkg:deb/debian/pcre3@7.6-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.6-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2008-0674"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89gs-mhbc-dyda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34904?format=json","vulnerability_id":"VCID-a952-adu8-8qfx","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385","reference_id":"","reference_type":"","scores":[{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85572","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85572"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629","reference_id":"1287629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385","reference_id":"CVE-2015-8385","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8385"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51936?format=json","vulnerability_id":"VCID-aunn-rnwm-1fhe","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7228.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7228","reference_id":"","reference_type":"","scores":[{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.8426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84279","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02159","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=383371","reference_id":"383371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=383371"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://security.gentoo.org/glsa/200802-10","reference_id":"GLSA-200802-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200802-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1059","reference_id":"RHSA-2007:1059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1063","reference_id":"RHSA-2007:1063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1065","reference_id":"RHSA-2007:1065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1068","reference_id":"RHSA-2007:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1076","reference_id":"RHSA-2007:1076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1077","reference_id":"RHSA-2007:1077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934558?format=json","purl":"pkg:deb/debian/pcre3@6.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2006-7228"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aunn-rnwm-1fhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51937?format=json","vulnerability_id":"VCID-bz2h-8zx3-fffy","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7230.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7230","reference_id":"","reference_type":"","scores":[{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86033","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86062","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86076","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02783","scoring_system":"epss","scoring_elements":"0.86069","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=384801","reference_id":"384801","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=384801"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1059","reference_id":"RHSA-2007:1059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1068","reference_id":"RHSA-2007:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1068"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934560?format=json","purl":"pkg:deb/debian/pcre3@7.0-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.0-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2006-7230"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bz2h-8zx3-fffy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34909?format=json","vulnerability_id":"VCID-cbu7-jb3m-nbf2","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389","reference_id":"","reference_type":"","scores":[{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.8577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659","reference_id":"1287659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389","reference_id":"CVE-2015-8389","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8389"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbu7-jb3m-nbf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51940?format=json","vulnerability_id":"VCID-cs49-wfxj-j3ba","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1661","reference_id":"","reference_type":"","scores":[{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.83815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02034","scoring_system":"epss","scoring_elements":"0.8381","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392931","reference_id":"392931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392931"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-1661"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cs49-wfxj-j3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34911?format=json","vulnerability_id":"VCID-dfts-4w3d-huc3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391","reference_id":"","reference_type":"","scores":[{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671","reference_id":"1287671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391","reference_id":"CVE-2015-8391","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8391"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49244?format=json","vulnerability_id":"VCID-dqaf-8bt4-e7b2","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4768","reference_id":"","reference_type":"","scores":[{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.9286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92861","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09602","scoring_system":"epss","scoring_elements":"0.92878","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392911","reference_id":"392911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392911"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-4768"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqaf-8bt4-e7b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81166?format=json","vulnerability_id":"VCID-eupp-h1mx-13dy","summary":"pcre: Integer overflow when parsing callout numeric arguments","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14155","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45809","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45783","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14155"},{"reference_url":"https://bugs.gentoo.org/717920","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.gentoo.org/717920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.pcre.org/original/changelog.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.pcre.org/original/changelog.txt"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848436","reference_id":"1848436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848436"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086","reference_id":"963086","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963086"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14155","reference_id":"CVE-2020-14155","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4373","reference_id":"RHSA-2021:4373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4613","reference_id":"RHSA-2021:4613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4614","reference_id":"RHSA-2021:4614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4614"},{"reference_url":"https://usn.ubuntu.com/5425-1/","reference_id":"USN-5425-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5425-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2020-14155"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eupp-h1mx-13dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7606?format=json","vulnerability_id":"VCID-jkr1-gvjw-wkcx","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nHeap-based buffer overflow in PCRE and PCRE2 allows remote attackers to execute arbitrary code via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210","reference_id":"","reference_type":"","scores":[{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90448","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433","reference_id":"787433","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210","reference_id":"CVE-2015-3210","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-3210"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkr1-gvjw-wkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34905?format=json","vulnerability_id":"VCID-kwfj-9bb2-dqcb","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386","reference_id":"","reference_type":"","scores":[{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636","reference_id":"1287636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386","reference_id":"CVE-2015-8386","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8386"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58170?format=json","vulnerability_id":"VCID-m72x-pqy7-myg3","summary":"A vulnerability in PCRE library allows remote attackers to cause a\n    Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6004","reference_id":"","reference_type":"","scores":[{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.8856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04081","scoring_system":"epss","scoring_elements":"0.88564","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425365","reference_id":"1425365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425365"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405","reference_id":"855405","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855405"},{"reference_url":"https://security.gentoo.org/glsa/201706-11","reference_id":"GLSA-201706-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-11"},{"reference_url":"https://usn.ubuntu.com/5665-1/","reference_id":"USN-5665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934570?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-2.1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-2.1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2017-6004"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m72x-pqy7-myg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85752?format=json","vulnerability_id":"VCID-mfmv-rw7p-rqbe","summary":"pcre: heap buffer overflow in compile_branch()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58125","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198","reference_id":"1207198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795","reference_id":"781795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2325"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfmv-rw7p-rqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51942?format=json","vulnerability_id":"VCID-mha6-j74w-wudp","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1662","reference_id":"","reference_type":"","scores":[{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0407","scoring_system":"epss","scoring_elements":"0.88543","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392921","reference_id":"392921","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392921"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-1662"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mha6-j74w-wudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34910?format=json","vulnerability_id":"VCID-mnr6-xgc9-xucz","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390","reference_id":"","reference_type":"","scores":[{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666","reference_id":"1287666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390","reference_id":"CVE-2015-8390","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8390"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnr6-xgc9-xucz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86205?format=json","vulnerability_id":"VCID-mq83-9qaf-ffgc","summary":"pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327","reference_id":"","reference_type":"","scores":[{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8616","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1503","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-010/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-010/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408","reference_id":"1285408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327","reference_id":"CVE-2015-2327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2327"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq83-9qaf-ffgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7607?format=json","vulnerability_id":"VCID-pejf-33ba-h3c1","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nPCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217","reference_id":"","reference_type":"","scores":[{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283","reference_id":"1228283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641","reference_id":"787641","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217","reference_id":"CVE-2015-3217","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-3217"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51935?format=json","vulnerability_id":"VCID-rdk3-3cmd-vkbg","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7227.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7227","reference_id":"","reference_type":"","scores":[{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84717","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84751","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84754","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84792","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=383341","reference_id":"383341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=383341"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1052","reference_id":"RHSA-2007:1052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1052"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934558?format=json","purl":"pkg:deb/debian/pcre3@6.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2006-7227"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdk3-3cmd-vkbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88599?format=json","vulnerability_id":"VCID-sue7-e3bs-tuep","summary":"pcre miscalculation of memory requirements for malformed Posix character class","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7225","reference_id":"","reference_type":"","scores":[{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.7967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.79697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01295","scoring_system":"epss","scoring_elements":"0.7969","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=384761","reference_id":"384761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=384761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1059","reference_id":"RHSA-2007:1059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1068","reference_id":"RHSA-2007:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1068"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934559?format=json","purl":"pkg:deb/debian/pcre3@6.7-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.7-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2006-7225"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sue7-e3bs-tuep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51939?format=json","vulnerability_id":"VCID-sy5p-ju6m-vbgp","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1660","reference_id":"","reference_type":"","scores":[{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05628","scoring_system":"epss","scoring_elements":"0.90342","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=315881","reference_id":"315881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=315881"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0967","reference_id":"RHSA-2007:0967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0968","reference_id":"RHSA-2007:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1063","reference_id":"RHSA-2007:1063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1065","reference_id":"RHSA-2007:1065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-1660"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sy5p-ju6m-vbgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34901?format=json","vulnerability_id":"VCID-tx1n-v7bn-7uhw","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381","reference_id":"","reference_type":"","scores":[{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9052","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1667","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1667"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1672","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539","reference_id":"795539","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381","reference_id":"CVE-2015-8381","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8381"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7327?format=json","vulnerability_id":"VCID-udse-25e2-vfeb","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nThe compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3191","reference_id":"","reference_type":"","scores":[{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11337","scoring_system":"epss","scoring_elements":"0.93526","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3191"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.debian.org/815920","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/815920"},{"reference_url":"https://bugs.debian.org/815921","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/815921"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1791","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.tenable.com/security/tns-2016-18","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-18"},{"reference_url":"http://vcs.pcre.org/pcre2?view=revision&revision=489","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre2?view=revision&revision=489"},{"reference_url":"http://vcs.pcre.org/pcre?view=revision&revision=1631","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre?view=revision&revision=1631"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/84810","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311503","reference_id":"1311503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311503"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920","reference_id":"815920","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921","reference_id":"815921","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3191","reference_id":"CVE-2016-3191","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934569?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2016-3191"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udse-25e2-vfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3682?format=json","vulnerability_id":"VCID-v2g6-h93b-euer","summary":"An integer overflow flaw was found in PCRE, a Perl-compatible regular expression library included within httpd. A local user who has the ability to create .htaccess files could create a maliciously crafted regular expression in such as way that they could gain the privileges of a httpd child.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=302847","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"reference_url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522","reference_id":"","reference_type":"","scores":[],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522"},{"reference_url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=112605112027335&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112605112027335&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=112606064317223&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112606064317223&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2491","reference_id":"","reference_type":"","scores":[{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83635","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.8364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.8363","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491"},{"reference_url":"http://secunia.com/advisories/16502","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16502"},{"reference_url":"http://secunia.com/advisories/16679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16679"},{"reference_url":"http://secunia.com/advisories/17252","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17252"},{"reference_url":"http://secunia.com/advisories/17813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17813"},{"reference_url":"http://secunia.com/advisories/19072","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19072"},{"reference_url":"http://secunia.com/advisories/19193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19193"},{"reference_url":"http://secunia.com/advisories/19532","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19532"},{"reference_url":"http://secunia.com/advisories/21522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21522"},{"reference_url":"http://secunia.com/advisories/22691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22691"},{"reference_url":"http://secunia.com/advisories/22875","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22875"},{"reference_url":"http://securityreason.com/securityalert/604","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/604"},{"reference_url":"http://securitytracker.com/id?1014744","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1014744"},{"reference_url":"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm"},{"reference_url":"http://www.debian.org/security/2005/dsa-800","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-800"},{"reference_url":"http://www.debian.org/security/2005/dsa-817","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-817"},{"reference_url":"http://www.debian.org/security/2005/dsa-819","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-819"},{"reference_url":"http://www.debian.org/security/2005/dsa-821","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-821"},{"reference_url":"http://www.ethereal.com/appnotes/enpa-sa-00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ethereal.com/appnotes/enpa-sa-00021.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_48_pcre.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_48_pcre.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_49_php.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_49_php.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_52_apache2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_52_apache2.html"},{"reference_url":"http://www.php.net/release_4_4_1.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/release_4_4_1.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-358.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-358.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-761.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-761.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0197.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0197.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427046/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427046/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14620","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14620"},{"reference_url":"http://www.securityfocus.com/bid/15647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15647"},{"reference_url":"http://www.vupen.com/english/advisories/2005/1511","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/1511"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0789","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0789"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4320","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4320"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4502","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4502"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324531","reference_id":"324531","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326628","reference_id":"326628","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326898","reference_id":"326898","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430638","reference_id":"430638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430638"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://httpd.apache.org/security/json/CVE-2005-2491.json","reference_id":"CVE-2005-2491","reference_type":"","scores":[{"value":"low","scoring_system":"apache_httpd","scoring_elements":""}],"url":"https://httpd.apache.org/security/json/CVE-2005-2491.json"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2491","reference_id":"CVE-2005-2491","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:358","reference_id":"RHSA-2005:358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:761","reference_id":"RHSA-2005:761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0197","reference_id":"RHSA-2006:0197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0197"},{"reference_url":"https://usn.ubuntu.com/173-1/","reference_id":"USN-173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/173-1/"},{"reference_url":"https://usn.ubuntu.com/173-2/","reference_id":"USN-173-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/173-2/"},{"reference_url":"https://usn.ubuntu.com/173-4/","reference_id":"USN-173-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/173-4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934556?format=json","purl":"pkg:deb/debian/pcre3@6.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2005-2491"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v2g6-h93b-euer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34899?format=json","vulnerability_id":"VCID-va26-j6rt-buab","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380","reference_id":"","reference_type":"","scores":[{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380"},{"reference_url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html","reference_id":"","reference_type":"","scores":[],"url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1637","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/77695","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413","reference_id":"1285413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467","reference_id":"806467","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380","reference_id":"CVE-2015-8380","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8380"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-va26-j6rt-buab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86176?format=json","vulnerability_id":"VCID-vjaf-nq1r-e3bm","summary":"pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328","reference_id":"","reference_type":"","scores":[{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85915","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1515","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-014/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-014/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399","reference_id":"1285399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328","reference_id":"CVE-2015-2328","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2328"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjaf-nq1r-e3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51943?format=json","vulnerability_id":"VCID-vrjs-v8f3-s3d7","summary":"PCRE is vulnerable to multiple buffer overflow and memory corruption\n    vulnerabilities, possibly leading to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4766","reference_id":"","reference_type":"","scores":[{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88204","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.8821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03859","scoring_system":"epss","scoring_elements":"0.88213","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392891","reference_id":"392891","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392891"},{"reference_url":"https://security.gentoo.org/glsa/200711-30","reference_id":"GLSA-200711-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-30"},{"reference_url":"https://usn.ubuntu.com/547-1/","reference_id":"USN-547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934561?format=json","purl":"pkg:deb/debian/pcre3@7.3-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@7.3-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2007-4766"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrjs-v8f3-s3d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88600?format=json","vulnerability_id":"VCID-wj2d-k1ha-pqgd","summary":"pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7226","reference_id":"","reference_type":"","scores":[{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.8232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82391","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=384781","reference_id":"384781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=384781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1059","reference_id":"RHSA-2007:1059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1068","reference_id":"RHSA-2007:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1068"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934559?format=json","purl":"pkg:deb/debian/pcre3@6.7-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.7-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2006-7226"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj2d-k1ha-pqgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34903?format=json","vulnerability_id":"VCID-wx7q-7bp6-bybq","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384","reference_id":"","reference_type":"","scores":[{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.788","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78857","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384","reference_id":"CVE-2015-8384","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8384"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7q-7bp6-bybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85285?format=json","vulnerability_id":"VCID-xwr2-6zpb-x7cn","summary":"pcre: incorrect nested table jumps when JIT is used (8.36/6)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769","reference_id":"","reference_type":"","scores":[{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769"},{"reference_url":"https://bugs.debian.org/819050","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/819050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769"},{"reference_url":"https://redmine.openinfosecfoundation.org/issues/1693","reference_id":"","reference_type":"","scores":[],"url":"https://redmine.openinfosecfoundation.org/issues/1693"},{"reference_url":"http://vcs.pcre.org/pcre?view=revision&revision=1475","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre?view=revision&revision=1475"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/26/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/26/1"},{"reference_url":"http://www.securityfocus.com/bid/85570","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85570"},{"reference_url":"http://www.securitytracker.com/id/1035424","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995","reference_id":"1320995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050","reference_id":"819050","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769","reference_id":"CVE-2014-9769","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2014-9769"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwr2-6zpb-x7cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7854?format=json","vulnerability_id":"VCID-ywee-ghvk-pubu","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nlibpcre1 in PCRE and libpcre2 in PCRE2 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7186","reference_id":"","reference_type":"","scores":[{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91528","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07102","scoring_system":"epss","scoring_elements":"0.91501","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7186"},{"reference_url":"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=2052","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=2052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"},{"reference_url":"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date","reference_id":"","reference_type":"","scores":[],"url":"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"},{"reference_url":"http://www.securityfocus.com/bid/97030","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97030"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434504","reference_id":"1434504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434504"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230","reference_id":"858230","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233","reference_id":"858233","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858233"},{"reference_url":"https://security.archlinux.org/ASA-201707-20","reference_id":"ASA-201707-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-20"},{"reference_url":"https://security.archlinux.org/ASA-201710-18","reference_id":"ASA-201710-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-18"},{"reference_url":"https://security.archlinux.org/AVG-222","reference_id":"AVG-222","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-222"},{"reference_url":"https://security.archlinux.org/AVG-223","reference_id":"AVG-223","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-223"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7186","reference_id":"CVE-2017-7186","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7186"},{"reference_url":"https://security.gentoo.org/glsa/201710-09","reference_id":"GLSA-201710-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-25","reference_id":"GLSA-201710-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-25"},{"reference_url":"https://usn.ubuntu.com/5665-1/","reference_id":"USN-5665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934571?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-3?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-3%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2017-7186"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ywee-ghvk-pubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34902?format=json","vulnerability_id":"VCID-yztb-bavc-kkgt","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383","reference_id":"","reference_type":"","scores":[{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.8483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614","reference_id":"1287614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383","reference_id":"CVE-2015-8383","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8383"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88610?format=json","vulnerability_id":"VCID-zejr-2fgr-hydx","summary":"pcre incorrect memory requirement computation","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4872","reference_id":"","reference_type":"","scores":[{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.81023","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.80961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.8097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.80992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.8102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.81027","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.81044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.81031","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4872"},{"reference_url":"http://scary.beasts.org/security/CESA-2007-006.html","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2007-006.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872"},{"reference_url":"http://secunia.com/advisories/27582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27582"},{"reference_url":"http://secunia.com/advisories/27773","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27773"},{"reference_url":"http://secunia.com/advisories/27869","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27869"},{"reference_url":"http://secunia.com/advisories/28658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28658"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_62_pcre.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_62_pcre.html"},{"reference_url":"http://www.pcre.org/changelog.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.pcre.org/changelog.txt"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-1052.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-1052.html"},{"reference_url":"http://www.securityfocus.com/bid/26462","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/26462"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=383361","reference_id":"383361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=383361"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4872","reference_id":"CVE-2005-4872","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1052","reference_id":"RHSA-2007:1052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1052"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934558?format=json","purl":"pkg:deb/debian/pcre3@6.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@6.2-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2005-4872"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zejr-2fgr-hydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85753?format=json","vulnerability_id":"VCID-zjgd-f5nj-zybz","summary":"pcre: heap buffer over-read in pcre_compile2() (8.37/23)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326","reference_id":"","reference_type":"","scores":[{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68602","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202","reference_id":"1207202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285","reference_id":"783285","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2326"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjgd-f5nj-zybz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}