Search for vulnerabilities
Vulnerability details: VCID-nn6h-q15u-vbfr
Vulnerability ID VCID-nn6h-q15u-vbfr
Aliases CVE-2015-5262
GHSA-fmj5-wv96-r2ch
Summary
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html
epss 0.01062 https://api.first.org/data/v1/epss?cve=CVE-2015-5262
epss 0.01062 https://api.first.org/data/v1/epss?cve=CVE-2015-5262
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=1261538
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-fmj5-wv96-r2ch
generic_textual MODERATE https://github.com/advisories/GHSA-fmj5-wv96-r2ch
generic_textual MODERATE https://issues.apache.org/jira/browse/HTTPCLIENT-1478
generic_textual MODERATE https://jenkins.io/security/advisory/2018-02-26
generic_textual MODERATE https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2015-5262
generic_textual MODERATE http://svn.apache.org/viewvc?view=revision&revision=1626784
generic_textual MODERATE http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
generic_textual MODERATE http://www.securitytracker.com/id/1033743
generic_textual MODERATE http://www.ubuntu.com/usn/USN-2769-1
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5262.json
https://api.first.org/data/v1/epss?cve=CVE-2015-5262
https://bugzilla.redhat.com/show_bug.cgi?id=1261538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/advisories/GHSA-fmj5-wv96-r2ch
https://github.com/apache/httpcomponents-client/commit/09027e7286974bf6b61f4106395da2623121db8d
https://github.com/apache/httpcomponents-client/commit/6705924879810f617a7a21d34f16b6c0d61e8d34
https://github.com/apache/httpcomponents-client/commit/d954cd287dfcdad8f153e61181e20d253175ca8c
https://issues.apache.org/jira/browse/HTTPCLIENT-1478
https://jenkins.io/security/advisory/2018-02-26
https://jenkins.io/security/advisory/2018-02-26/
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5262
http://svn.apache.org/viewvc?view=revision&revision=1626784
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securitytracker.com/id/1033743
http://www.ubuntu.com/usn/USN-2769-1
798650 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798650
USN-2769-1 https://usn.ubuntu.com/2769-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.76642
EPSS Score 0.01062
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T11:55:21.349733+00:00 ProjectKB MSRImporter Import https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv 36.1.3