Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/934574?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "type": "deb", "namespace": "debian", "name": "pcs", "version": "0.10.8-1+deb11u1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.11.3-1", "latest_non_vulnerable_version": "0.12.2-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85538?format=api", "vulnerability_id": "VCID-3bdn-5bra-5kbr", "summary": "pcs: Command injection with root privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.7019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70202", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70196", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.7028", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70265", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70294", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70303", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70338", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70346", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70344", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70316", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70358", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70389", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70357", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70383", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00629", "scoring_system": "epss", "scoring_elements": "0.70435", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5190" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252813", "reference_id": "1252813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1700", "reference_id": "RHSA-2015:1700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1700" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934573?format=api", "purl": "pkg:deb/debian/pcs@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5190" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bdn-5bra-5kbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85329?format=api", "vulnerability_id": "VCID-9253-hxxf-b3ds", "summary": "pcs: Cross-Site Request Forgery in web UI", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2596.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2596.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0720.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0720.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0720", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51541", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51463", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51389", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5144", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51467", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51516", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5147", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51476", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51437", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51381", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51431", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51475", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51435", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720" }, { "reference_url": "https://github.com/ClusterLabs/pcs/commit/b9e7f061788c3b86a0c67d2d4158f067ec5eb625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/ClusterLabs/pcs/commit/b9e7f061788c3b86a0c67d2d4158f067ec5eb625" }, { "reference_url": "http://www.securityfocus.com/bid/97984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97984" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299614", "reference_id": "1299614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299614" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0720", "reference_id": "CVE-2016-0720", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2596", "reference_id": "RHSA-2016:2596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2596" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934577?format=api", "purl": "pkg:deb/debian/pcs@0.9.149-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.149-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-0720" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9253-hxxf-b3ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73382?format=api", "vulnerability_id": "VCID-au19-kepf-pyhe", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1086.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1086.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42067", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42069", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42007", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41924", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41781", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41849", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41866", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4178", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41804", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.41879", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557366", "reference_id": "1557366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557366" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895313", "reference_id": "895313", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1927", "reference_id": "RHSA-2018:1927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1927" }, { "reference_url": "https://usn.ubuntu.com/7614-1/", "reference_id": "USN-7614-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7614-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934579?format=api", "purl": "pkg:deb/debian/pcs@0.9.164-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.164-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-1086" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-au19-kepf-pyhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79084?format=api", "vulnerability_id": "VCID-hjzc-ca2p-pyf8", "summary": "pcs: obtaining an authentication token for hacluster user could lead to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13571", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13556", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13416", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13497", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13469", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13361", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13265", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13423", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13507", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13499", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13529", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16124", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018930", "reference_id": "1018930", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018930" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116815", "reference_id": "2116815", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6312", "reference_id": "RHSA-2022:6312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6313", "reference_id": "RHSA-2022:6313", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6314", "reference_id": "RHSA-2022:6314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6341", "reference_id": "RHSA-2022:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6341" }, { "reference_url": "https://usn.ubuntu.com/7614-1/", "reference_id": "USN-7614-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7614-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934581?format=api", "purl": "pkg:deb/debian/pcs@0.11.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-2735" ], "risk_score": 3.8, "exploitability": "0.5", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjzc-ca2p-pyf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85672?format=api", "vulnerability_id": "VCID-hs6e-5g21-c7cx", "summary": "pcs: improper web session variable signing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3983.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.6938", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69438", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69477", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69529", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69537", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69542", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69518", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.6956", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69594", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69565", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.006", "scoring_system": "epss", "scoring_elements": "0.69637", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3983" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208294", "reference_id": "1208294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0980", "reference_id": "RHSA-2015:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0990", "reference_id": "RHSA-2015:0990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0990" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934573?format=api", "purl": "pkg:deb/debian/pcs@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-3983" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hs6e-5g21-c7cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79578?format=api", "vulnerability_id": "VCID-jmq9-4ac2-c7de", "summary": "pcs: improper authentication via PAM", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1049.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1049.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1049", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.5076", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50872", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50901", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50879", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50829", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50797", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50721", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50774", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50805", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50791", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50868", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066629", "reference_id": "2066629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7447", "reference_id": "RHSA-2022:7447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7935", "reference_id": "RHSA-2022:7935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7935" }, { "reference_url": "https://usn.ubuntu.com/7614-1/", "reference_id": "USN-7614-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7614-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934580?format=api", "purl": "pkg:deb/debian/pcs@0.11.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-1049" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jmq9-4ac2-c7de" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85330?format=api", "vulnerability_id": "VCID-p3c7-4pkf-1qg7", "summary": "pcs: cookies are not invalidated upon logout", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2596.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2596.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63587", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63535", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63393", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63472", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63454", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63462", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63448", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63466", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63478", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63474", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63446", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6349", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63544", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63508", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721" }, { "reference_url": "https://github.com/ClusterLabs/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/ClusterLabs/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17" }, { "reference_url": "https://github.com/ClusterLabs/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/ClusterLabs/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774" }, { "reference_url": "https://github.com/ClusterLabs/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/ClusterLabs/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b" }, { "reference_url": "http://www.securityfocus.com/bid/97977", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97977" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299615", "reference_id": "1299615", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299615" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clusterlabs:pcs:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0721", "reference_id": "CVE-2016-0721", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2596", "reference_id": "RHSA-2016:2596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2596" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934577?format=api", "purl": "pkg:deb/debian/pcs@0.9.149-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.149-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-0721" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3c7-4pkf-1qg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85671?format=api", "vulnerability_id": "VCID-q6mh-54hq-3yfa", "summary": "pcs: improper web session variable signing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1848.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1848.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1848", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.7894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79013", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78998", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.78988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79016", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79012", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79045", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79052", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79067", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.7908", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.791", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79116", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79114", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79129", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0121", "scoring_system": "epss", "scoring_elements": "0.79165", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1848" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208294", "reference_id": "1208294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0980", "reference_id": "RHSA-2015:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0990", "reference_id": "RHSA-2015:0990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0990" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934573?format=api", "purl": "pkg:deb/debian/pcs@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1848" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q6mh-54hq-3yfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83561?format=api", "vulnerability_id": "VCID-wrhk-ya3a-bbfz", "summary": "pcs: Privilege escalation via authorized user malicious REST call", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1079.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1079.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1079", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61156", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.6117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61218", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61199", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61188", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61203", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61197", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61195", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61253", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.613", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550243", "reference_id": "1550243", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550243" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895314", "reference_id": "895314", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895314" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934579?format=api", "purl": "pkg:deb/debian/pcs@0.9.164-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.164-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-1079" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrhk-ya3a-bbfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84498?format=api", "vulnerability_id": "VCID-xmq8-39wj-fqgp", "summary": "pcs: Improper node name field validation when creating clusters leads to XSS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2661.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51301", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51353", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.5138", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51413", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51442", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.5145", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51429", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51378", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51385", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51345", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51291", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51341", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51384", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51344", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0028", "scoring_system": "epss", "scoring_elements": "0.51372", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2661" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428948", "reference_id": "1428948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428948" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858379", "reference_id": "858379", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858379" }, { "reference_url": "https://usn.ubuntu.com/7614-1/", "reference_id": "USN-7614-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7614-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934578?format=api", "purl": "pkg:deb/debian/pcs@0.9.155%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.9.155%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2661" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xmq8-39wj-fqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85537?format=api", "vulnerability_id": "VCID-yscv-wf2k-wbf1", "summary": "pcs: Incorrect authorization when using pcs web UI", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5189.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5189.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5189", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32808", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3294", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32874", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32853", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32795", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3253", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32446", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32308", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32372", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3238", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32288", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3231", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32378", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5189" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252805", "reference_id": "1252805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1700", "reference_id": "RHSA-2015:1700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1700" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934573?format=api", "purl": "pkg:deb/debian/pcs@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934574?format=api", "purl": "pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934572?format=api", "purl": "pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934576?format=api", "purl": "pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934575?format=api", "purl": "pkg:deb/debian/pcs@0.12.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5189" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yscv-wf2k-wbf1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie" }