{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","type":"deb","namespace":"debian","name":"pcre3","version":"2:8.35-7.2","qualifiers":{"distro":"bullseye"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2:8.38-1","latest_non_vulnerable_version":"2:8.39-15","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85857?format=json","vulnerability_id":"VCID-7ufs-uvgd-v3ht","summary":"php: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)","references":[{"reference_url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834","reference_id":"","reference_type":"","scores":[],"url":"http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382","reference_id":"","reference_type":"","scores":[{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82846","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82691","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82695","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82726","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82774","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82793","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01772","scoring_system":"epss","scoring_elements":"0.82809","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8382"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1537","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/04/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/08/04/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/76157","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225","reference_id":"1187225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187225"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589","reference_id":"794589","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:8.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382","reference_id":"CVE-2015-8382","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8382"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8382"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ufs-uvgd-v3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7606?format=json","vulnerability_id":"VCID-jkr1-gvjw-wkcx","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nHeap-based buffer overflow in PCRE and PCRE2 allows remote attackers to execute arbitrary code via a crafted regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210","reference_id":"","reference_type":"","scores":[{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.9044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90456","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90502","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90499","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0573","scoring_system":"epss","scoring_elements":"0.90522","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433","reference_id":"787433","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210","reference_id":"CVE-2015-3210","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-3210"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkr1-gvjw-wkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85752?format=json","vulnerability_id":"VCID-mfmv-rw7p-rqbe","summary":"pcre: heap buffer overflow in compile_branch()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2325.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64645","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64694","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64738","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64709","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64731","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64786","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198","reference_id":"1207198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795","reference_id":"781795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2325"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfmv-rw7p-rqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86205?format=json","vulnerability_id":"VCID-mq83-9qaf-ffgc","summary":"pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327","reference_id":"","reference_type":"","scores":[{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86307","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86173","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86201","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.86257","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02821","scoring_system":"epss","scoring_elements":"0.8627","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2327"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1503","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-010/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-010/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408","reference_id":"1285408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327","reference_id":"CVE-2015-2327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2327"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq83-9qaf-ffgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86176?format=json","vulnerability_id":"VCID-vjaf-nq1r-e3bm","summary":"pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1025.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2328.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328","reference_id":"","reference_type":"","scores":[{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.86072","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85915","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.8594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.85984","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.86006","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.86024","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.86021","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02714","scoring_system":"epss","scoring_elements":"0.86034","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2328"},{"reference_url":"https://bugs.exim.org/show_bug.cgi?id=1515","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.exim.org/show_bug.cgi?id=1515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328"},{"reference_url":"https://jira.mongodb.org/browse/SERVER-17252","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mongodb.org/browse/SERVER-17252"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886"},{"reference_url":"http://www.fortiguard.com/advisory/FG-VD-15-014/","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/FG-VD-15-014/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/74924","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74924"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399","reference_id":"1285399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328","reference_id":"CVE-2015-2328","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1025","reference_id":"RHSA-2016:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2328"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjaf-nq1r-e3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34903?format=json","vulnerability_id":"VCID-wx7q-7bp6-bybq","summary":"Multiple vulnerabilities have been found in libpcre, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384","reference_id":"","reference_type":"","scores":[{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.79028","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.788","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78857","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.7894","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78975","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78989","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8384"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa128","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384"},{"reference_url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/29/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/29/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623","reference_id":"1287623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384","reference_id":"CVE-2015-8384","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384"},{"reference_url":"https://security.gentoo.org/glsa/201607-02","reference_id":"GLSA-201607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-8384"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7q-7bp6-bybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85753?format=json","vulnerability_id":"VCID-zjgd-f5nj-zybz","summary":"pcre: heap buffer over-read in pcre_compile2() (8.37/23)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2326.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326","reference_id":"","reference_type":"","scores":[{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68765","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6865","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6864","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68682","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.6872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68687","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00569","scoring_system":"epss","scoring_elements":"0.68711","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202","reference_id":"1207202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285","reference_id":"783285","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2694-1/","reference_id":"USN-2694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2694-1/"},{"reference_url":"https://usn.ubuntu.com/2943-1/","reference_id":"USN-2943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934566?format=json","purl":"pkg:deb/debian/pcre3@2:8.35-7.2?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934557?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-13?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-13%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/934555?format=json","purl":"pkg:deb/debian/pcre3@2:8.39-15?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.39-15%3Fdistro=bullseye"}],"aliases":["CVE-2015-2326"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjgd-f5nj-zybz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcre3@2:8.35-7.2%3Fdistro=bullseye"}