{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","type":"deb","namespace":"debian","name":"pcre3","version":"2:8.38-1","qualifiers":{"distro":"bullseye"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2:8.38-2","latest_non_vulnerable_version":"2:8.39-15","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34906?format=json","vulnerability_id":"VCID-3a9g-pj5j-nbbc","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387","reference_id":"","reference_type":"","scores":[{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80896","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.8079","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80791","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.8082","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01448","scoring_system":"epss","scoring_elements":"0.80851","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8387"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646","reference_id":"1287646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287646"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387","reference_id":"CVE-2015-8387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8387"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8387"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3a9g-pj5j-nbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34912?format=json","vulnerability_id":"VCID-4kzr-datq-bbcp","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392","reference_id":"","reference_type":"","scores":[{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89063","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.8899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.88995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.8903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89037","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04389","scoring_system":"epss","scoring_elements":"0.89052","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8392"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690","reference_id":"1287690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392","reference_id":"CVE-2015-8392","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8392"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34913?format=json","vulnerability_id":"VCID-52he-28zb-z7bj","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393","reference_id":"","reference_type":"","scores":[{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72482","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72368","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72453","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8393"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695","reference_id":"1287695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287695"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393","reference_id":"CVE-2015-8393","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8393"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8393"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52he-28zb-z7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34915?format=json","vulnerability_id":"VCID-5vhs-7ffz-rkaf","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395","reference_id":"","reference_type":"","scores":[{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85185","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8512","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85126","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.8514","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02405","scoring_system":"epss","scoring_elements":"0.85165","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8395"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395","reference_id":"CVE-2015-8395","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8395"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34914?format=json","vulnerability_id":"VCID-7vb2-byp7-uyb3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394","reference_id":"","reference_type":"","scores":[{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83285","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.8318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.8321","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8394"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702","reference_id":"1287702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287702"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394","reference_id":"CVE-2015-8394","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8394"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8394"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vb2-byp7-uyb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34904?format=json","vulnerability_id":"VCID-a952-adu8-8qfx","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385","reference_id":"","reference_type":"","scores":[{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89939","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.8989","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05145","scoring_system":"epss","scoring_elements":"0.89928","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8385"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/85572","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85572"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629","reference_id":"1287629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385","reference_id":"CVE-2015-8385","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8385"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34909?format=json","vulnerability_id":"VCID-cbu7-jb3m-nbf2","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389","reference_id":"","reference_type":"","scores":[{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85856","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.8577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85817","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02653","scoring_system":"epss","scoring_elements":"0.85834","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8389"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659","reference_id":"1287659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287659"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389","reference_id":"CVE-2015-8389","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8389"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8389"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbu7-jb3m-nbf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34911?format=json","vulnerability_id":"VCID-dfts-4w3d-huc3","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391","reference_id":"","reference_type":"","scores":[{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9111","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91058","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8391"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671","reference_id":"1287671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391","reference_id":"CVE-2015-8391","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8391"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34905?format=json","vulnerability_id":"VCID-kwfj-9bb2-dqcb","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386","reference_id":"","reference_type":"","scores":[{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9186","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9185","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.9183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0752","scoring_system":"epss","scoring_elements":"0.91839","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8386"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636","reference_id":"1287636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386","reference_id":"CVE-2015-8386","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8386"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34910?format=json","vulnerability_id":"VCID-mnr6-xgc9-xucz","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390","reference_id":"","reference_type":"","scores":[{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86372","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86352","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.8625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.8629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86302","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86331","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8390"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/82990","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666","reference_id":"1287666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390","reference_id":"CVE-2015-8390","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8390"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8390"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnr6-xgc9-xucz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7607?format=json","vulnerability_id":"VCID-pejf-33ba-h3c1","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nPCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217","reference_id":"","reference_type":"","scores":[{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75087","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75123","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7513","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75166","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75191","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283","reference_id":"1228283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641","reference_id":"787641","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217","reference_id":"CVE-2015-3217","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-3217"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34901?format=json","vulnerability_id":"VCID-tx1n-v7bn-7uhw","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381","reference_id":"","reference_type":"","scores":[{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9058","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.9054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90551","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05803","scoring_system":"epss","scoring_elements":"0.90569","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8381"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1667","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1667"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1672","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711","reference_id":"1287711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539","reference_id":"795539","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796762","reference_id":"796762","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796762"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381","reference_id":"CVE-2015-8381","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8381"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34899?format=json","vulnerability_id":"VCID-va26-j6rt-buab","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380","reference_id":"","reference_type":"","scores":[{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79355","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.7928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79285","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79316","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79336","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8380"},{"reference_url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html","reference_id":"","reference_type":"","scores":[],"url":"https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1637","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/77695","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413","reference_id":"1285413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285413"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467","reference_id":"806467","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380","reference_id":"CVE-2015-8380","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8380"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8380"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-va26-j6rt-buab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85285?format=json","vulnerability_id":"VCID-xwr2-6zpb-x7cn","summary":"pcre: incorrect nested table jumps when JIT is used (8.36/6)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769","reference_id":"","reference_type":"","scores":[{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76294","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76272","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76234","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76244","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9769"},{"reference_url":"https://bugs.debian.org/819050","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/819050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769"},{"reference_url":"https://redmine.openinfosecfoundation.org/issues/1693","reference_id":"","reference_type":"","scores":[],"url":"https://redmine.openinfosecfoundation.org/issues/1693"},{"reference_url":"http://vcs.pcre.org/pcre?view=revision&revision=1475","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre?view=revision&revision=1475"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/26/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/26/1"},{"reference_url":"http://www.securityfocus.com/bid/85570","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85570"},{"reference_url":"http://www.securitytracker.com/id/1035424","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995","reference_id":"1320995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1320995"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050","reference_id":"819050","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819050"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769","reference_id":"CVE-2014-9769","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9769"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2014-9769"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwr2-6zpb-x7cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34902?format=json","vulnerability_id":"VCID-yztb-bavc-kkgt","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383","reference_id":"","reference_type":"","scores":[{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84943","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.8483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02335","scoring_system":"epss","scoring_elements":"0.84919","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8383"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230216-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20230216-0002/"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614","reference_id":"1287614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383","reference_id":"CVE-2015-8383","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934565?format=json","purl":"pkg:deb/debian/pcre3@2:8.38-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8383"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.38-1%3Fdistro=bullseye"}