Lookup for vulnerable packages by Package URL.

Purlpkg:gem/mail@1.3.3
Typegem
Namespace
Namemail
Version1.3.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.5.5
Latest_non_vulnerable_version2.7.0.rc1
Affected_by_vulnerabilities
0
url VCID-1svp-fwt6-pbey
vulnerability_id VCID-1svp-fwt6-pbey
summary
SMTP Injection via to/from addresses
The mail package does not disallow CRLF in email addresses; an attacker can inject SMTP commands in specially crafted email addresses passed to `RCPT TO` and `MAIL FROM`.
references
0
reference_url http://openwall.com/lists/oss-security/2015/12/11/3
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2015/12/11/3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9097.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9097
reference_id
reference_type
scores
0
value 0.01021
scoring_system epss
scoring_elements 0.77273
published_at 2026-04-18T12:55:00Z
1
value 0.01021
scoring_system epss
scoring_elements 0.77172
published_at 2026-04-01T12:55:00Z
2
value 0.01021
scoring_system epss
scoring_elements 0.77179
published_at 2026-04-02T12:55:00Z
3
value 0.01021
scoring_system epss
scoring_elements 0.77208
published_at 2026-04-04T12:55:00Z
4
value 0.01021
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-07T12:55:00Z
5
value 0.01021
scoring_system epss
scoring_elements 0.77221
published_at 2026-04-08T12:55:00Z
6
value 0.01021
scoring_system epss
scoring_elements 0.7723
published_at 2026-04-09T12:55:00Z
7
value 0.01021
scoring_system epss
scoring_elements 0.77257
published_at 2026-04-11T12:55:00Z
8
value 0.01021
scoring_system epss
scoring_elements 0.77237
published_at 2026-04-12T12:55:00Z
9
value 0.01021
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-13T12:55:00Z
10
value 0.01021
scoring_system epss
scoring_elements 0.77272
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9097
4
reference_url https://github.com/advisories/GHSA-q86f-fmqf-qrf6
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-q86f-fmqf-qrf6
5
reference_url https://github.com/mikel/mail
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail
6
reference_url https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83
7
reference_url https://github.com/mikel/mail/pull/1097
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/pull/1097
8
reference_url https://github.com/rubysec/ruby-advisory-db/issues/215
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/issues/215
9
reference_url https://hackerone.com/reports/137631
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/137631
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9097
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-9097
11
reference_url https://rubysec.com/advisories/mail-OSVDB-131677
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rubysec.com/advisories/mail-OSVDB-131677
12
reference_url http://www.mbsd.jp/Whitepaper/smtpi.pdf
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mbsd.jp/Whitepaper/smtpi.pdf
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1293598
reference_id 1293598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1293598
fixed_packages
0
url pkg:gem/mail@2.5.5.rc1
purl pkg:gem/mail@2.5.5.rc1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1svp-fwt6-pbey
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.5.5.rc1
1
url pkg:gem/mail@2.5.5
purl pkg:gem/mail@2.5.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.5.5
2
url pkg:gem/mail@2.6.6.rc1
purl pkg:gem/mail@2.6.6.rc1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.6.6.rc1
3
url pkg:gem/mail@2.7.0.rc1
purl pkg:gem/mail@2.7.0.rc1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.7.0.rc1
aliases CVE-2015-9097, GHSA-q86f-fmqf-qrf6, OSV-131677
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1svp-fwt6-pbey
1
url VCID-3xkv-ckqz-r3dx
vulnerability_id VCID-3xkv-ckqz-r3dx
summary
Improper Input Validation
The Mail gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2140.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2140.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2140
reference_id
reference_type
scores
0
value 0.03667
scoring_system epss
scoring_elements 0.87901
published_at 2026-04-13T12:55:00Z
1
value 0.03667
scoring_system epss
scoring_elements 0.87903
published_at 2026-04-12T12:55:00Z
2
value 0.03667
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-04T12:55:00Z
3
value 0.03667
scoring_system epss
scoring_elements 0.87914
published_at 2026-04-18T12:55:00Z
4
value 0.03667
scoring_system epss
scoring_elements 0.87915
published_at 2026-04-16T12:55:00Z
5
value 0.03667
scoring_system epss
scoring_elements 0.87854
published_at 2026-04-02T12:55:00Z
6
value 0.03667
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-07T12:55:00Z
7
value 0.03667
scoring_system epss
scoring_elements 0.8791
published_at 2026-04-11T12:55:00Z
8
value 0.03667
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-09T12:55:00Z
9
value 0.03667
scoring_system epss
scoring_elements 0.87892
published_at 2026-04-08T12:55:00Z
10
value 0.03667
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2140
5
reference_url https://bugzilla.novell.com/show_bug.cgi?id=759092
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.novell.com/show_bug.cgi?id=759092
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816352
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=816352
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2140
8
reference_url http://secunia.com/advisories/48970
reference_id
reference_type
scores
url http://secunia.com/advisories/48970
9
reference_url https://github.com/mikel/mail
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail
10
reference_url https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc
11
reference_url https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0
12
reference_url https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2
13
reference_url http://www.openwall.com/lists/oss-security/2012/04/25/8
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/25/8
14
reference_url http://www.openwall.com/lists/oss-security/2012/04/26/1
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/26/1
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2140
reference_id CVE-2012-2140
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-2140
16
reference_url https://github.com/advisories/GHSA-rp63-jfmw-532w
reference_id GHSA-rp63-jfmw-532w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rp63-jfmw-532w
17
reference_url https://access.redhat.com/errata/RHSA-2012:1542
reference_id RHSA-2012:1542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1542
fixed_packages
0
url pkg:gem/mail@2.4.3
purl pkg:gem/mail@2.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1svp-fwt6-pbey
1
vulnerability VCID-3xkv-ckqz-r3dx
2
vulnerability VCID-z8cv-3uer-pqbm
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.4.3
aliases CVE-2012-2140, GHSA-rp63-jfmw-532w, OSV-81632
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xkv-ckqz-r3dx
2
url VCID-m9tp-apd1-z7c6
vulnerability_id VCID-m9tp-apd1-z7c6
summary
Improper Input Validation
The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
references
0
reference_url http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1
1
reference_url http://osvdb.org/70667
reference_id
reference_type
scores
url http://osvdb.org/70667
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0739
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73164
published_at 2026-04-18T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.73089
published_at 2026-04-04T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73063
published_at 2026-04-07T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.731
published_at 2026-04-08T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73114
published_at 2026-04-09T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73139
published_at 2026-04-11T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73118
published_at 2026-04-12T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73112
published_at 2026-04-13T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73155
published_at 2026-04-16T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73059
published_at 2026-04-01T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73069
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0739
3
reference_url http://secunia.com/advisories/43077
reference_id
reference_type
scores
url http://secunia.com/advisories/43077
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65010
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65010
5
reference_url https://github.com/mikel/mail
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail
6
reference_url https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.yml
8
reference_url https://web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021
9
reference_url http://www.securityfocus.com/bid/46021
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46021
10
reference_url http://www.vupen.com/english/advisories/2011/0233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0233
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.2.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.5.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:1.6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.0.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.0.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.1.5.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.11:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.13:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.5.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.6.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.9:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mikel_lindsaar:mail:2.2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mikel_lindsaar:mail:2.2.9.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0739
reference_id CVE-2011-0739
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2011-0739
64
reference_url https://github.com/advisories/GHSA-cpjc-p7fc-j9xh
reference_id GHSA-cpjc-p7fc-j9xh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cpjc-p7fc-j9xh
fixed_packages
0
url pkg:gem/mail@2.2.15
purl pkg:gem/mail@2.2.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1svp-fwt6-pbey
1
vulnerability VCID-3xkv-ckqz-r3dx
2
vulnerability VCID-z8cv-3uer-pqbm
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.2.15
aliases CVE-2011-0739, GHSA-cpjc-p7fc-j9xh, OSV-70667
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m9tp-apd1-z7c6
3
url VCID-z8cv-3uer-pqbm
vulnerability_id VCID-z8cv-3uer-pqbm
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2139.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2139
reference_id
reference_type
scores
0
value 0.03527
scoring_system epss
scoring_elements 0.87624
published_at 2026-04-07T12:55:00Z
1
value 0.03527
scoring_system epss
scoring_elements 0.87669
published_at 2026-04-18T12:55:00Z
2
value 0.03527
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-13T12:55:00Z
3
value 0.03527
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-04T12:55:00Z
4
value 0.03527
scoring_system epss
scoring_elements 0.87644
published_at 2026-04-08T12:55:00Z
5
value 0.03527
scoring_system epss
scoring_elements 0.87656
published_at 2026-04-12T12:55:00Z
6
value 0.03527
scoring_system epss
scoring_elements 0.87661
published_at 2026-04-11T12:55:00Z
7
value 0.03527
scoring_system epss
scoring_elements 0.8765
published_at 2026-04-09T12:55:00Z
8
value 0.03527
scoring_system epss
scoring_elements 0.87598
published_at 2026-04-01T12:55:00Z
9
value 0.03527
scoring_system epss
scoring_elements 0.87608
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2139
5
reference_url https://bugzilla.novell.com/show_bug.cgi?id=759092
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.novell.com/show_bug.cgi?id=759092
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816352
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=816352
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2139
8
reference_url https://github.com/mikel/mail
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail
9
reference_url https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f
10
reference_url http://www.openwall.com/lists/oss-security/2012/04/25/8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/25/8
11
reference_url http://www.openwall.com/lists/oss-security/2012/04/26/1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/26/1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=891762
reference_id 891762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=891762
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2139
reference_id CVE-2012-2139
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-2139
14
reference_url https://github.com/advisories/GHSA-cj92-c4fj-w9c5
reference_id GHSA-cj92-c4fj-w9c5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cj92-c4fj-w9c5
15
reference_url https://access.redhat.com/errata/RHSA-2012:1542
reference_id RHSA-2012:1542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1542
fixed_packages
0
url pkg:gem/mail@2.4.4
purl pkg:gem/mail@2.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1svp-fwt6-pbey
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/mail@2.4.4
aliases CVE-2012-2139, GHSA-cj92-c4fj-w9c5, OSV-81631
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8cv-3uer-pqbm
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/mail@1.3.3