Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/uw-imap@4:2001adebian-6
Typedeb
Namespacedebian
Nameuw-imap
Version4:2001adebian-6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8:2007f~dfsg-6
Latest_non_vulnerable_version8:2007f~dfsg-6
Affected_by_vulnerabilities
0
url VCID-3exb-uh1x-rkf8
vulnerability_id VCID-3exb-uh1x-rkf8
summary
Multiple vulnerabilities have been found in the UW IMAP toolkit and the
    c-client library, the worst of which leading to the execution of arbitrary
    code.
references
0
reference_url http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html
reference_id
reference_type
scores
url http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html
1
reference_url http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html
reference_id
reference_type
scores
url http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html
2
reference_url http://marc.info/?l=full-disclosure&m=122572590212610&w=4
reference_id
reference_type
scores
url http://marc.info/?l=full-disclosure&m=122572590212610&w=4
3
reference_url http://panda.com/imap/
reference_id
reference_type
scores
url http://panda.com/imap/
4
reference_url http://rhn.redhat.com/errata/RHSA-2009-0275.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2009-0275.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5005.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5005.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5005
reference_id
reference_type
scores
0
value 0.04761
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-18T12:55:00Z
1
value 0.04761
scoring_system epss
scoring_elements 0.89411
published_at 2026-04-01T12:55:00Z
2
value 0.04761
scoring_system epss
scoring_elements 0.89415
published_at 2026-04-02T12:55:00Z
3
value 0.04761
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-04T12:55:00Z
4
value 0.04761
scoring_system epss
scoring_elements 0.89427
published_at 2026-04-07T12:55:00Z
5
value 0.04761
scoring_system epss
scoring_elements 0.89443
published_at 2026-04-08T12:55:00Z
6
value 0.04761
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-09T12:55:00Z
7
value 0.04761
scoring_system epss
scoring_elements 0.89456
published_at 2026-04-11T12:55:00Z
8
value 0.04761
scoring_system epss
scoring_elements 0.89454
published_at 2026-04-12T12:55:00Z
9
value 0.04761
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5005
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005
8
reference_url http://secunia.com/advisories/32483
reference_id
reference_type
scores
url http://secunia.com/advisories/32483
9
reference_url http://secunia.com/advisories/32512
reference_id
reference_type
scores
url http://secunia.com/advisories/32512
10
reference_url http://secunia.com/advisories/33142
reference_id
reference_type
scores
url http://secunia.com/advisories/33142
11
reference_url http://secunia.com/advisories/33996
reference_id
reference_type
scores
url http://secunia.com/advisories/33996
12
reference_url http://securityreason.com/securityalert/4570
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4570
13
reference_url http://securitytracker.com/id?1021131
reference_id
reference_type
scores
url http://securitytracker.com/id?1021131
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46281
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46281
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10485
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10485
16
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-065.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-065.htm
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00058.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00058.html
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00082.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00082.html
19
reference_url http://www.bitsec.com/en/rad/bsa-081103.c
reference_id
reference_type
scores
url http://www.bitsec.com/en/rad/bsa-081103.c
20
reference_url http://www.bitsec.com/en/rad/bsa-081103.txt
reference_id
reference_type
scores
url http://www.bitsec.com/en/rad/bsa-081103.txt
21
reference_url http://www.debian.org/security/2008/dsa-1685
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1685
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
23
reference_url http://www.openwall.com/lists/oss-security/2008/11/03/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/03/3
24
reference_url http://www.openwall.com/lists/oss-security/2008/11/03/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/03/4
25
reference_url http://www.openwall.com/lists/oss-security/2008/11/03/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/03/5
26
reference_url http://www.securityfocus.com/archive/1/498002/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498002/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/32072
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32072
28
reference_url http://www.vupen.com/english/advisories/2008/3042
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3042
29
reference_url http://www.washington.edu/alpine/tmailbug.html
reference_id
reference_type
scores
url http://www.washington.edu/alpine/tmailbug.html
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=469667
reference_id 469667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=469667
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.80:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.81:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.82:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.83:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.98:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.98:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.98:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.99:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.99:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.99:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.999:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.999:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.999:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.9999:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.9999:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.9999:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.99999:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.99999:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.99999:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.999999:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:0.999999:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:0.999999:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:1.00:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:1.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:alpine:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:alpine:2.00:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2002:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2003:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2003:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2003:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2004:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2004:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2004:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2005:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2005:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2005:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2006:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2007c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007c:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5005
reference_id CVE-2008-5005
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5005
52
reference_url https://security.gentoo.org/glsa/200911-03
reference_id GLSA-200911-03
reference_type
scores
url https://security.gentoo.org/glsa/200911-03
53
reference_url https://access.redhat.com/errata/RHSA-2009:0275
reference_id RHSA-2009:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0275
fixed_packages
0
url pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
purl pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
aliases CVE-2008-5005
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3exb-uh1x-rkf8
1
url VCID-5scr-2vxt-e7gz
vulnerability_id VCID-5scr-2vxt-e7gz
summary
UW IMAP contains a vulnerability in the code handling CRAM-MD5
    authentication allowing authentication bypass.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0198.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0198
reference_id
reference_type
scores
0
value 0.26656
scoring_system epss
scoring_elements 0.96352
published_at 2026-04-18T12:55:00Z
1
value 0.26656
scoring_system epss
scoring_elements 0.96301
published_at 2026-04-01T12:55:00Z
2
value 0.26656
scoring_system epss
scoring_elements 0.96309
published_at 2026-04-02T12:55:00Z
3
value 0.26656
scoring_system epss
scoring_elements 0.96316
published_at 2026-04-04T12:55:00Z
4
value 0.26656
scoring_system epss
scoring_elements 0.96321
published_at 2026-04-07T12:55:00Z
5
value 0.26656
scoring_system epss
scoring_elements 0.96329
published_at 2026-04-08T12:55:00Z
6
value 0.26656
scoring_system epss
scoring_elements 0.96332
published_at 2026-04-09T12:55:00Z
7
value 0.26656
scoring_system epss
scoring_elements 0.96337
published_at 2026-04-11T12:55:00Z
8
value 0.26656
scoring_system epss
scoring_elements 0.96336
published_at 2026-04-12T12:55:00Z
9
value 0.26656
scoring_system epss
scoring_elements 0.96339
published_at 2026-04-13T12:55:00Z
10
value 0.26656
scoring_system epss
scoring_elements 0.96348
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198
3
reference_url http://secunia.com/advisories/14057
reference_id
reference_type
scores
url http://secunia.com/advisories/14057
4
reference_url http://secunia.com/advisories/14097
reference_id
reference_type
scores
url http://secunia.com/advisories/14097
5
reference_url http://securitytracker.com/id?1013037
reference_id
reference_type
scores
url http://securitytracker.com/id?1013037
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11306
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11306
7
reference_url http://www.gentoo.org/security/en/glsa/glsa-200502-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200502-02.xml
8
reference_url http://www.kb.cert.org/vuls/id/702777
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/702777
9
reference_url http://www.kb.cert.org/vuls/id/CRDY-68QSL5
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/CRDY-68QSL5
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:026
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:026
11
reference_url http://www.redhat.com/support/errata/RHSA-2005-128.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-128.html
12
reference_url http://www.securityfocus.com/bid/12391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12391
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617488
reference_id 1617488
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617488
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0198
reference_id CVE-2005-0198
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0198
16
reference_url https://security.gentoo.org/glsa/200502-02
reference_id GLSA-200502-02
reference_type
scores
url https://security.gentoo.org/glsa/200502-02
17
reference_url https://access.redhat.com/errata/RHSA-2005:128
reference_id RHSA-2005:128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:128
fixed_packages
0
url pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
purl pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3exb-uh1x-rkf8
1
vulnerability VCID-6jh1-37ph-2bev
2
vulnerability VCID-75gm-tz5w-qfan
3
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
aliases CVE-2005-0198
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5scr-2vxt-e7gz
2
url VCID-6jh1-37ph-2bev
vulnerability_id VCID-6jh1-37ph-2bev
summary
Multiple vulnerabilities have been found in the UW IMAP toolkit and the
    c-client library, the worst of which leading to the execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5006.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5006
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71449
published_at 2026-04-18T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71354
published_at 2026-04-01T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71362
published_at 2026-04-02T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-07T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71396
published_at 2026-04-08T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71408
published_at 2026-04-09T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71431
published_at 2026-04-11T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71416
published_at 2026-04-12T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71398
published_at 2026-04-13T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71444
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006
3
reference_url http://secunia.com/advisories/33142
reference_id
reference_type
scores
url http://secunia.com/advisories/33142
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46604
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46604
5
reference_url http://www.debian.org/security/2008/dsa-1685
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1685
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
7
reference_url http://www.openwall.com/lists/oss-security/2008/11/03/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/03/5
8
reference_url http://www.securityfocus.com/bid/32280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32280
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=470820
reference_id 470820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=470820
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:imap_toolkit:2007b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:imap_toolkit:2007b:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5006
reference_id CVE-2008-5006
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5006
12
reference_url https://security.gentoo.org/glsa/200911-03
reference_id GLSA-200911-03
reference_type
scores
url https://security.gentoo.org/glsa/200911-03
fixed_packages
0
url pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
purl pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@8:2007e~dfsg-3.1
aliases CVE-2008-5006
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jh1-37ph-2bev
3
url VCID-75gm-tz5w-qfan
vulnerability_id VCID-75gm-tz5w-qfan
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
2
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2006-0276.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0276.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2006-0549.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0549.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2933.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2933.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2933
reference_id
reference_type
scores
0
value 0.35083
scoring_system epss
scoring_elements 0.97042
published_at 2026-04-18T12:55:00Z
1
value 0.35083
scoring_system epss
scoring_elements 0.97002
published_at 2026-04-01T12:55:00Z
2
value 0.35083
scoring_system epss
scoring_elements 0.97009
published_at 2026-04-02T12:55:00Z
3
value 0.35083
scoring_system epss
scoring_elements 0.97013
published_at 2026-04-04T12:55:00Z
4
value 0.35083
scoring_system epss
scoring_elements 0.97014
published_at 2026-04-07T12:55:00Z
5
value 0.35083
scoring_system epss
scoring_elements 0.97023
published_at 2026-04-08T12:55:00Z
6
value 0.35083
scoring_system epss
scoring_elements 0.97024
published_at 2026-04-09T12:55:00Z
7
value 0.35083
scoring_system epss
scoring_elements 0.97027
published_at 2026-04-11T12:55:00Z
8
value 0.35083
scoring_system epss
scoring_elements 0.97028
published_at 2026-04-13T12:55:00Z
9
value 0.35083
scoring_system epss
scoring_elements 0.97038
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2933
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2933
8
reference_url http://secunia.com/advisories/17062/
reference_id
reference_type
scores
url http://secunia.com/advisories/17062/
9
reference_url http://secunia.com/advisories/17148
reference_id
reference_type
scores
url http://secunia.com/advisories/17148
10
reference_url http://secunia.com/advisories/17152
reference_id
reference_type
scores
url http://secunia.com/advisories/17152
11
reference_url http://secunia.com/advisories/17215
reference_id
reference_type
scores
url http://secunia.com/advisories/17215
12
reference_url http://secunia.com/advisories/17276
reference_id
reference_type
scores
url http://secunia.com/advisories/17276
13
reference_url http://secunia.com/advisories/17336
reference_id
reference_type
scores
url http://secunia.com/advisories/17336
14
reference_url http://secunia.com/advisories/17483
reference_id
reference_type
scores
url http://secunia.com/advisories/17483
15
reference_url http://secunia.com/advisories/17928
reference_id
reference_type
scores
url http://secunia.com/advisories/17928
16
reference_url http://secunia.com/advisories/17930
reference_id
reference_type
scores
url http://secunia.com/advisories/17930
17
reference_url http://secunia.com/advisories/17950
reference_id
reference_type
scores
url http://secunia.com/advisories/17950
18
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
19
reference_url http://secunia.com/advisories/19832
reference_id
reference_type
scores
url http://secunia.com/advisories/19832
20
reference_url http://secunia.com/advisories/20210
reference_id
reference_type
scores
url http://secunia.com/advisories/20210
21
reference_url http://secunia.com/advisories/20222
reference_id
reference_type
scores
url http://secunia.com/advisories/20222
22
reference_url http://secunia.com/advisories/20951
reference_id
reference_type
scores
url http://secunia.com/advisories/20951
23
reference_url http://secunia.com/advisories/21252
reference_id
reference_type
scores
url http://secunia.com/advisories/21252
24
reference_url http://secunia.com/advisories/21564
reference_id
reference_type
scores
url http://secunia.com/advisories/21564
25
reference_url http://securityreason.com/securityalert/47
reference_id
reference_type
scores
url http://securityreason.com/securityalert/47
26
reference_url http://securitytracker.com/id?1015000
reference_id
reference_type
scores
url http://securitytracker.com/id?1015000
27
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/22518
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/22518
28
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858
30
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
31
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
32
reference_url http://www.debian.org/security/2005/dsa-861
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-861
33
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml
34
reference_url http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true
35
reference_url http://www.kb.cert.org/vuls/id/933601
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/933601
36
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:189
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:189
37
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:194
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:194
38
reference_url http://www.novell.com/linux/security/advisories/2005_23_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_23_sr.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2005-848.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-848.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2005-850.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-850.html
41
reference_url http://www.redhat.com/support/errata/RHSA-2006-0501.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0501.html
42
reference_url http://www.securityfocus.com/archive/1/430296/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/430296/100/0/threaded
43
reference_url http://www.securityfocus.com/archive/1/430303/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/430303/100/0/threaded
44
reference_url http://www.securityfocus.com/bid/15009
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15009
45
reference_url http://www.vupen.com/english/advisories/2006/2685
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/2685
46
reference_url http://www.washington.edu/imap/
reference_id
reference_type
scores
url http://www.washington.edu/imap/
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617767
reference_id 1617767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617767
48
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332215
reference_id 332215
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332215
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2933
reference_id CVE-2005-2933
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2933
57
reference_url https://access.redhat.com/errata/RHSA-2005:848
reference_id RHSA-2005:848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:848
58
reference_url https://access.redhat.com/errata/RHSA-2005:850
reference_id RHSA-2005:850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:850
59
reference_url https://access.redhat.com/errata/RHSA-2006:0276
reference_id RHSA-2006:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0276
60
reference_url https://access.redhat.com/errata/RHSA-2006:0501
reference_id RHSA-2006:0501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0501
61
reference_url https://access.redhat.com/errata/RHSA-2006:0549
reference_id RHSA-2006:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0549
fixed_packages
0
url pkg:deb/debian/uw-imap@7:2002edebian1-13.1
purl pkg:deb/debian/uw-imap@7:2002edebian1-13.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3exb-uh1x-rkf8
1
vulnerability VCID-6jh1-37ph-2bev
2
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@7:2002edebian1-13.1
aliases CVE-2005-2933
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75gm-tz5w-qfan
4
url VCID-anhs-xyx5-4fbf
vulnerability_id VCID-anhs-xyx5-4fbf
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0297.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0297
reference_id
reference_type
scores
0
value 0.00911
scoring_system epss
scoring_elements 0.75759
published_at 2026-04-01T12:55:00Z
1
value 0.00911
scoring_system epss
scoring_elements 0.75762
published_at 2026-04-02T12:55:00Z
2
value 0.00911
scoring_system epss
scoring_elements 0.75794
published_at 2026-04-04T12:55:00Z
3
value 0.00911
scoring_system epss
scoring_elements 0.75773
published_at 2026-04-07T12:55:00Z
4
value 0.00911
scoring_system epss
scoring_elements 0.75806
published_at 2026-04-08T12:55:00Z
5
value 0.00911
scoring_system epss
scoring_elements 0.75818
published_at 2026-04-09T12:55:00Z
6
value 0.00911
scoring_system epss
scoring_elements 0.75842
published_at 2026-04-11T12:55:00Z
7
value 0.00911
scoring_system epss
scoring_elements 0.75823
published_at 2026-04-12T12:55:00Z
8
value 0.00911
scoring_system epss
scoring_elements 0.75816
published_at 2026-04-13T12:55:00Z
9
value 0.00911
scoring_system epss
scoring_elements 0.75854
published_at 2026-04-16T12:55:00Z
10
value 0.00911
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0297
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0297
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617017
reference_id 1617017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617017
4
reference_url https://access.redhat.com/errata/RHSA-2005:015
reference_id RHSA-2005:015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:015
5
reference_url https://access.redhat.com/errata/RHSA-2005:114
reference_id RHSA-2005:114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:114
fixed_packages
0
url pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
purl pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3exb-uh1x-rkf8
1
vulnerability VCID-6jh1-37ph-2bev
2
vulnerability VCID-75gm-tz5w-qfan
3
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
aliases CVE-2003-0297
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anhs-xyx5-4fbf
5
url VCID-dcbh-qs9z-ubaw
vulnerability_id VCID-dcbh-qs9z-ubaw
summary
Multiple vulnerabilities have been found in PHP, the worst of which
    could result in the execution of arbitrary shell commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19518.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19518
reference_id
reference_type
scores
0
value 0.93869
scoring_system epss
scoring_elements 0.99871
published_at 2026-04-18T12:55:00Z
1
value 0.93869
scoring_system epss
scoring_elements 0.9987
published_at 2026-04-13T12:55:00Z
2
value 0.93956
scoring_system epss
scoring_elements 0.99883
published_at 2026-04-04T12:55:00Z
3
value 0.93956
scoring_system epss
scoring_elements 0.99882
published_at 2026-04-02T12:55:00Z
4
value 0.93956
scoring_system epss
scoring_elements 0.99884
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19935
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1654228
reference_id 1654228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1654228
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914632
reference_id 914632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914632
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45914.rb
reference_id CVE-2018-19518
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45914.rb
12
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/b3ad4a03581f53c670d91e82d2a4ef00ec392f8f/modules/exploits/linux/http/php_imap_open_rce.rb
reference_id CVE-2018-19518
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/b3ad4a03581f53c670d91e82d2a4ef00ec392f8f/modules/exploits/linux/http/php_imap_open_rce.rb
13
reference_url https://security.gentoo.org/glsa/202003-57
reference_id GLSA-202003-57
reference_type
scores
url https://security.gentoo.org/glsa/202003-57
14
reference_url https://usn.ubuntu.com/4160-1/
reference_id USN-4160-1
reference_type
scores
url https://usn.ubuntu.com/4160-1/
fixed_packages
0
url pkg:deb/debian/uw-imap@8:2007f~dfsg-6
purl pkg:deb/debian/uw-imap@8:2007f~dfsg-6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@8:2007f~dfsg-6
aliases CVE-2018-19518
risk_score 10.0
exploitability 2.0
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcbh-qs9z-ubaw
6
url VCID-sme9-5sz7-yuh2
vulnerability_id VCID-sme9-5sz7-yuh2
summary The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1782
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23058
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23223
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23267
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23057
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23183
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23166
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23109
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23122
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23115
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1782
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1782
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315499
reference_id 315499
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315499
fixed_packages
0
url pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
purl pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3exb-uh1x-rkf8
1
vulnerability VCID-6jh1-37ph-2bev
2
vulnerability VCID-75gm-tz5w-qfan
3
vulnerability VCID-dcbh-qs9z-ubaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@7:2002edebian1-11sarge1
aliases CVE-2002-1782
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sme9-5sz7-yuh2
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/uw-imap@4:2001adebian-6