Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/exim4@4.96-15%2Bdeb12u7
Typedeb
Namespacedebian
Nameexim4
Version4.96-15+deb12u7
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5e2k-ure4-wfdf
vulnerability_id VCID-5e2k-ure4-wfdf
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
reference_id
reference_type
scores
0
value 0.0735
scoring_system epss
scoring_elements 0.91671
published_at 2026-04-02T12:55:00Z
1
value 0.0735
scoring_system epss
scoring_elements 0.91722
published_at 2026-04-21T12:55:00Z
2
value 0.0735
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-16T12:55:00Z
3
value 0.0735
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-18T12:55:00Z
4
value 0.0735
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-04T12:55:00Z
5
value 0.0735
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-07T12:55:00Z
6
value 0.0735
scoring_system epss
scoring_elements 0.91698
published_at 2026-04-08T12:55:00Z
7
value 0.0735
scoring_system epss
scoring_elements 0.91705
published_at 2026-04-09T12:55:00Z
8
value 0.0735
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-11T12:55:00Z
9
value 0.0735
scoring_system epss
scoring_elements 0.91711
published_at 2026-04-12T12:55:00Z
10
value 0.0735
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
reference_id 2241531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
reference_id ZDI-23-1471
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-03T16:58:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
fixed_packages
0
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7
aliases CVE-2023-42117
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5e2k-ure4-wfdf
1
url VCID-6dwr-t9kn-2yfn
vulnerability_id VCID-6dwr-t9kn-2yfn
summary A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3559
reference_id
reference_type
scores
0
value 0.00658
scoring_system epss
scoring_elements 0.71002
published_at 2026-04-02T12:55:00Z
1
value 0.00658
scoring_system epss
scoring_elements 0.7102
published_at 2026-04-04T12:55:00Z
2
value 0.00658
scoring_system epss
scoring_elements 0.70994
published_at 2026-04-07T12:55:00Z
3
value 0.00658
scoring_system epss
scoring_elements 0.71037
published_at 2026-04-08T12:55:00Z
4
value 0.00658
scoring_system epss
scoring_elements 0.71052
published_at 2026-04-09T12:55:00Z
5
value 0.00658
scoring_system epss
scoring_elements 0.71075
published_at 2026-04-11T12:55:00Z
6
value 0.00658
scoring_system epss
scoring_elements 0.7106
published_at 2026-04-12T12:55:00Z
7
value 0.00658
scoring_system epss
scoring_elements 0.71042
published_at 2026-04-13T12:55:00Z
8
value 0.00658
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-16T12:55:00Z
9
value 0.00658
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-18T12:55:00Z
10
value 0.00658
scoring_system epss
scoring_elements 0.71076
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3559
2
reference_url https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
reference_id 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
reference_id EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
4
reference_url https://vuldb.com/?id.211073
reference_id ?id.211073
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://vuldb.com/?id.211073
5
reference_url https://bugs.exim.org/show_bug.cgi?id=2915
reference_id show_bug.cgi?id=2915
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://bugs.exim.org/show_bug.cgi?id=2915
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
reference_id TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
7
reference_url https://usn.ubuntu.com/5741-1/
reference_id USN-5741-1
reference_type
scores
url https://usn.ubuntu.com/5741-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
reference_id WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
fixed_packages
0
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7
aliases CVE-2022-3559
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwr-t9kn-2yfn
2
url VCID-m8mt-ya9x-yqaq
vulnerability_id VCID-m8mt-ya9x-yqaq
summary The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38371
reference_id
reference_type
scores
0
value 0.02209
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-21T12:55:00Z
1
value 0.02209
scoring_system epss
scoring_elements 0.84382
published_at 2026-04-01T12:55:00Z
2
value 0.02209
scoring_system epss
scoring_elements 0.84397
published_at 2026-04-02T12:55:00Z
3
value 0.02209
scoring_system epss
scoring_elements 0.84417
published_at 2026-04-04T12:55:00Z
4
value 0.02209
scoring_system epss
scoring_elements 0.8442
published_at 2026-04-07T12:55:00Z
5
value 0.02209
scoring_system epss
scoring_elements 0.84441
published_at 2026-04-08T12:55:00Z
6
value 0.02209
scoring_system epss
scoring_elements 0.84446
published_at 2026-04-09T12:55:00Z
7
value 0.02209
scoring_system epss
scoring_elements 0.84465
published_at 2026-04-11T12:55:00Z
8
value 0.02209
scoring_system epss
scoring_elements 0.84459
published_at 2026-04-12T12:55:00Z
9
value 0.02209
scoring_system epss
scoring_elements 0.84455
published_at 2026-04-13T12:55:00Z
10
value 0.02209
scoring_system epss
scoring_elements 0.84477
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38371
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992172
reference_id 992172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992172
3
reference_url https://security.archlinux.org/AVG-2272
reference_id AVG-2272
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2272
4
reference_url https://usn.ubuntu.com/6881-1/
reference_id USN-6881-1
reference_type
scores
url https://usn.ubuntu.com/6881-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7
aliases CVE-2021-38371
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8mt-ya9x-yqaq
3
url VCID-puuy-w6ze-9kc7
vulnerability_id VCID-puuy-w6ze-9kc7
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
reference_id
reference_type
scores
0
value 0.00731
scoring_system epss
scoring_elements 0.72637
published_at 2026-04-02T12:55:00Z
1
value 0.00731
scoring_system epss
scoring_elements 0.72725
published_at 2026-04-21T12:55:00Z
2
value 0.00731
scoring_system epss
scoring_elements 0.72722
published_at 2026-04-16T12:55:00Z
3
value 0.00731
scoring_system epss
scoring_elements 0.72733
published_at 2026-04-18T12:55:00Z
4
value 0.00731
scoring_system epss
scoring_elements 0.72654
published_at 2026-04-04T12:55:00Z
5
value 0.00731
scoring_system epss
scoring_elements 0.72632
published_at 2026-04-07T12:55:00Z
6
value 0.00731
scoring_system epss
scoring_elements 0.72671
published_at 2026-04-08T12:55:00Z
7
value 0.00731
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-09T12:55:00Z
8
value 0.00731
scoring_system epss
scoring_elements 0.72707
published_at 2026-04-11T12:55:00Z
9
value 0.00731
scoring_system epss
scoring_elements 0.7269
published_at 2026-04-12T12:55:00Z
10
value 0.00731
scoring_system epss
scoring_elements 0.7268
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
reference_id 2241542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
reference_id ZDI-23-1473
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T16:29:47Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
fixed_packages
0
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7
aliases CVE-2023-42119
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-puuy-w6ze-9kc7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7