Lookup for vulnerable packages by Package URL.

GET /api/packages/1036063?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1036063?format=api",
    "purl": "pkg:deb/debian/enigmail@2:0.94.2-2",
    "type": "deb",
    "namespace": "debian",
    "name": "enigmail",
    "version": "2:0.94.2-2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2:2.2.4-0.2~deb10u1",
    "latest_non_vulnerable_version": "2:2.2.4-0.2~deb10u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70766?format=api",
            "vulnerability_id": "VCID-1t5g-b5jt-8yft",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52502",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52414",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52406",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52459",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52453",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52504",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52488",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52511",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://sourceforge.net/p/enigmail/bugs/709/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceforge.net/p/enigmail/bugs/709/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17847",
                    "reference_id": "CVE-2017-17847",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17847"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17847"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1t5g-b5jt-8yft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91665?format=api",
            "vulnerability_id": "VCID-74uy-aghm-bkhd",
            "summary": "Enigmail 0.94.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Enigmail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.",
            "references": [
                {
                    "reference_url": "http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1264",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9391",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93843",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93852",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93862",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93873",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93877",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93882",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93881",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93903",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93909",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1264"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1264",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1264"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24416",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24416"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/2353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/2353"
                },
                {
                    "reference_url": "http://www.coresecurity.com/?action=item&id=1687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.coresecurity.com/?action=item&id=1687"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/461958/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/461958/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/461958/30/7710/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/461958/30/7710/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/22758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/22758"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1017727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1017727"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/0835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/0835"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=415225",
                    "reference_id": "415225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=415225"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1264",
                    "reference_id": "CVE-2007-1264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1264"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29690.py",
                    "reference_id": "CVE-2007-1264;OSVDB-33502",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29690.py"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/22759/info",
                    "reference_id": "CVE-2007-1264;OSVDB-33502",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/22759/info"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036064?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:0.95.0%2B1-4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-f212-18j2-rych"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-xbab-79ux-t3bn"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:0.95.0%252B1-4"
                }
            ],
            "aliases": [
                "CVE-2007-1264"
            ],
            "risk_score": 9.0,
            "exploitability": "2.0",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74uy-aghm-bkhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70763?format=api",
            "vulnerability_id": "VCID-7535-appn-5fhm",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46892",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46943",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4687",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46887",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46834",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46891",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46947",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17844",
                    "reference_id": "CVE-2017-17844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17844"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17844"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7535-appn-5fhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73645?format=api",
            "vulnerability_id": "VCID-9cm4-mu3q-2yey",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2018/06/08/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2018/06/08/2"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82466",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82424",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82461",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86037",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86048",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86065",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8637",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86389",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86413",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86411",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020"
                },
                {
                    "reference_url": "https://dev.gnupg.org/T4012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://dev.gnupg.org/T4012"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Apr/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Apr/38"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html"
                },
                {
                    "reference_url": "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3964-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3964-1/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4222"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4223"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4224"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/30/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/30/4"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104450"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041051"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589620",
                    "reference_id": "1589620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589620"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901088",
                    "reference_id": "901088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901088"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201806-8",
                    "reference_id": "ASA-201806-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201806-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-713",
                    "reference_id": "AVG-713",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-713"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12020",
                    "reference_id": "CVE-2018-12020",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2180",
                    "reference_id": "RHSA-2018:2180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2181",
                    "reference_id": "RHSA-2018:2181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2181"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3675-1/",
                    "reference_id": "USN-3675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3675-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3675-2/",
                    "reference_id": "USN-3675-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3675-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3675-3/",
                    "reference_id": "USN-3675-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3675-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4839-1/",
                    "reference_id": "USN-USN-4839-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4839-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2018-12020"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cm4-mu3q-2yey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93501?format=api",
            "vulnerability_id": "VCID-bz74-1y1q-8qfc",
            "summary": "The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.",
            "references": [
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2018/06/13/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2018/06/13/10"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65499",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65371",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65419",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65446",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65409",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65462",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65473",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65492",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12019"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Apr/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Apr/38"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf"
                },
                {
                    "reference_url": "https://www.enigmail.net/index.php/en/download/changelog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.enigmail.net/index.php/en/download/changelog"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/30/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/30/4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12019",
                    "reference_id": "CVE-2018-12019",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12019"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2018-12019"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz74-1y1q-8qfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83473?format=api",
            "vulnerability_id": "VCID-c5zg-brhd-4ygg",
            "summary": "OpenPGP: CFB gadget attacks allows to exfiltrate plaintext out of encrypted emails",
            "references": [
                {
                    "reference_url": "http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17688.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17688.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87102",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8717",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87174",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87151",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87164",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17688"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17688"
                },
                {
                    "reference_url": "https://efail.de",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://efail.de"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html"
                },
                {
                    "reference_url": "https://news.ycombinator.com/item?id=17066419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://news.ycombinator.com/item?id=17066419"
                },
                {
                    "reference_url": "https://protonmail.com/blog/pgp-vulnerability-efail",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://protonmail.com/blog/pgp-vulnerability-efail"
                },
                {
                    "reference_url": "https://twitter.com/matthew_d_green/status/995996706457243648",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://twitter.com/matthew_d_green/status/995996706457243648"
                },
                {
                    "reference_url": "https://www.patreon.com/posts/cybersecurity-15-18814817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.patreon.com/posts/cybersecurity-15-18814817"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_18_22",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.synology.com/support/security/Synology_SA_18_22"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104162"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040904"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577906",
                    "reference_id": "1577906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577906"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898630",
                    "reference_id": "898630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898630"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:mail:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:mail:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:mail:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:mail:-:*:*:*:*:iphone_os:*:*",
                    "reference_id": "cpe:2.3:a:apple:mail:-:*:*:*:*:iphone_os:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:mail:-:*:*:*:*:iphone_os:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bloop:airmail:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bloop:airmail:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bloop:airmail:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emclient:emclient:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:emclient:emclient:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emclient:emclient:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:flipdogsolutions:maildroid:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:flipdogsolutions:maildroid:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:flipdogsolutions:maildroid:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freron:mailmate:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freron:mailmate:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freron:mailmate:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:horde:horde_imp:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:horde:horde_imp:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:horde:horde_imp:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postbox-inc:postbox:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postbox-inc:postbox:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postbox-inc:postbox:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:r2mail2:r2mail2:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:r2mail2:r2mail2:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:r2mail2:r2mail2:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:roundcube:webmail:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17688",
                    "reference_id": "CVE-2017-17688",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17688"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17688"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c5zg-brhd-4ygg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79884?format=api",
            "vulnerability_id": "VCID-f212-18j2-rych",
            "summary": "update",
            "references": [],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                }
            ],
            "aliases": [
                "DSA-3921-1 enigmail"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f212-18j2-rych"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93936?format=api",
            "vulnerability_id": "VCID-g4s8-7k7n-c3an",
            "summary": "Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a \"correctly signed\" message indication, but display different unauthenticated text.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51814",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51775",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5183",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51739",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51859",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51892",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51827",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12269"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929363",
                    "reference_id": "929363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929363"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2019-12269"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g4s8-7k7n-c3an"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70767?format=api",
            "vulnerability_id": "VCID-gqrn-ek3y-hbg1",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75274",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75283",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75185",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75219",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75239",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75237",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00872",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75276",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Apr/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Apr/38"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://sourceforge.net/p/enigmail/bugs/709/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceforge.net/p/enigmail/bugs/709/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/30/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/30/4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17848",
                    "reference_id": "CVE-2017-17848",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17848"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17848"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqrn-ek3y-hbg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94026?format=api",
            "vulnerability_id": "VCID-mmdw-63mg-2uhm",
            "summary": "In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the \"EFAIL\" attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34633",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34874",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34793",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34785",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34745",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14664"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2019-14664"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmdw-63mg-2uhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93570?format=api",
            "vulnerability_id": "VCID-tqpx-hedp-dfcb",
            "summary": "Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48795",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4868",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.487",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48754",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48751",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48769",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48743",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4875",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15586"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Apr/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Apr/38"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired"
                },
                {
                    "reference_url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf"
                },
                {
                    "reference_url": "https://sourceforge.net/p/enigmail/bugs/849/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceforge.net/p/enigmail/bugs/849/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/30/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/30/4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15586",
                    "reference_id": "CVE-2018-15586",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15586"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2018-15586"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpx-hedp-dfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70765?format=api",
            "vulnerability_id": "VCID-ux6a-2384-suf9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73776",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73768",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73678",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73687",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73683",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73718",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73731",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73752",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73735",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73726",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17846",
                    "reference_id": "CVE-2017-17846",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17846"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17846"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ux6a-2384-suf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70764?format=api",
            "vulnerability_id": "VCID-x8dz-d9af-fyg2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66347",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66224",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66264",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6629",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6626",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66308",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66297",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66332",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17845",
                    "reference_id": "CVE-2017-17845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17845"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17845"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8dz-d9af-fyg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61278?format=api",
            "vulnerability_id": "VCID-xbab-79ux-t3bn",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html"
                },
                {
                    "reference_url": "https://advisories.mageia.org/MGASA-2014-0421.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://advisories.mageia.org/MGASA-2014-0421.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68955",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68875",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68895",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68926",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68968",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68953",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68964",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00582",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68975",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60779"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60887",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60887"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61854",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61854"
                },
                {
                    "reference_url": "http://sourceforge.net/p/enigmail/bugs/294/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/p/enigmail/bugs/294/"
                },
                {
                    "reference_url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/18/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/08/18/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/22/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/08/22/1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5369",
                    "reference_id": "CVE-2014-5369",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5369"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036066?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.7.2-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-f212-18j2-rych"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.7.2-3"
                }
            ],
            "aliases": [
                "CVE-2014-5369"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbab-79ux-t3bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70762?format=api",
            "vulnerability_id": "VCID-zm59-us92-2bh1",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42547",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42628",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42511",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4261",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42549",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42601",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42612",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42597",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42569",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17848"
                },
                {
                    "reference_url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4070"
                },
                {
                    "reference_url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17843",
                    "reference_id": "CVE-2017-17843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17843"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036068?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1t5g-b5jt-8yft"
                        },
                        {
                            "vulnerability": "VCID-7535-appn-5fhm"
                        },
                        {
                            "vulnerability": "VCID-9cm4-mu3q-2yey"
                        },
                        {
                            "vulnerability": "VCID-bz74-1y1q-8qfc"
                        },
                        {
                            "vulnerability": "VCID-c5zg-brhd-4ygg"
                        },
                        {
                            "vulnerability": "VCID-g4s8-7k7n-c3an"
                        },
                        {
                            "vulnerability": "VCID-gqrn-ek3y-hbg1"
                        },
                        {
                            "vulnerability": "VCID-mmdw-63mg-2uhm"
                        },
                        {
                            "vulnerability": "VCID-tqpx-hedp-dfcb"
                        },
                        {
                            "vulnerability": "VCID-ux6a-2384-suf9"
                        },
                        {
                            "vulnerability": "VCID-x8dz-d9af-fyg2"
                        },
                        {
                            "vulnerability": "VCID-zm59-us92-2bh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:1.9.9-1~deb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036940?format=api",
                    "purl": "pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.2~deb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-17843"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zm59-us92-2bh1"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "9.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:0.94.2-2"
}