{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85538?format=json","vulnerability_id":"VCID-3bdn-5bra-5kbr","summary":"pcs: Command injection with root privileges.","aliases":[{"alias":"CVE-2015-5190"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934573?format=json","purl":"pkg:deb/debian/pcs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934574?format=json","purl":"pkg:deb/debian/pcs@0.10.8-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.10.8-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934572?format=json","purl":"pkg:deb/debian/pcs@0.11.5-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.11.5-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934576?format=json","purl":"pkg:deb/debian/pcs@0.12.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934575?format=json","purl":"pkg:deb/debian/pcs@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pcs@0.12.2-1%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/117134?format=json","purl":"pkg:rpm/redhat/pcs@0.9.137-13.el7_1?arch=4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3bdn-5bra-5kbr"},{"vulnerability":"VCID-yscv-wf2k-wbf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pcs@0.9.137-13.el7_1%3Farch=4"},{"url":"http://public2.vulnerablecode.io/api/packages/117133?format=json","purl":"pkg:rpm/redhat/pcs@0.9.139-9.el6_7?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3bdn-5bra-5kbr"},{"vulnerability":"VCID-yscv-wf2k-wbf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pcs@0.9.139-9.el6_7%3Farch=1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5190","reference_id":"","reference_type":"","scores":[{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.7019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.7028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70358","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70389","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70357","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70383","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70435","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70446","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.7046","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5190"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252813","reference_id":"1252813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1252813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1700","reference_id":"RHSA-2015:1700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1700"}],"weaknesses":[{"cwe_id":77,"name":"Improper Neutralization of Special Elements used in a Command ('Command Injection')","description":"The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bdn-5bra-5kbr"}