Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/exim4@0?distro=trixie
Typedeb
Namespacedebian
Nameexim4
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.11-0.0.1
Latest_non_vulnerable_version4.99.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-85d7-xwsd-u7hf
vulnerability_id VCID-85d7-xwsd-u7hf
summary Exim: Exim before 4.96 has an invalid free in pam_converse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37451.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37451
reference_id
reference_type
scores
0
value 0.06068
scoring_system epss
scoring_elements 0.90711
published_at 2026-04-02T12:55:00Z
1
value 0.06068
scoring_system epss
scoring_elements 0.90721
published_at 2026-04-04T12:55:00Z
2
value 0.06068
scoring_system epss
scoring_elements 0.90731
published_at 2026-04-07T12:55:00Z
3
value 0.06068
scoring_system epss
scoring_elements 0.90742
published_at 2026-04-08T12:55:00Z
4
value 0.06068
scoring_system epss
scoring_elements 0.90748
published_at 2026-04-09T12:55:00Z
5
value 0.06068
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-11T12:55:00Z
6
value 0.06068
scoring_system epss
scoring_elements 0.90756
published_at 2026-04-12T12:55:00Z
7
value 0.06068
scoring_system epss
scoring_elements 0.90753
published_at 2026-04-13T12:55:00Z
8
value 0.06068
scoring_system epss
scoring_elements 0.90772
published_at 2026-04-16T12:55:00Z
9
value 0.06068
scoring_system epss
scoring_elements 0.90769
published_at 2026-04-18T12:55:00Z
10
value 0.06068
scoring_system epss
scoring_elements 0.90768
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119782
reference_id 2119782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119782
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.95-4?distro=trixie
purl pkg:deb/debian/exim4@4.95-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.95-4%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-37451
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85d7-xwsd-u7hf
1
url VCID-h3v8-dkfk-2bfr
vulnerability_id VCID-h3v8-dkfk-2bfr
summary A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53881
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07477
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07349
published_at 2026-04-18T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07362
published_at 2026-04-02T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07406
published_at 2026-04-04T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-07T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07445
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07468
published_at 2026-04-09T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07461
published_at 2026-04-11T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07447
published_at 2026-04-12T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-13T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07363
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53881
1
reference_url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53881
reference_id show_bug.cgi?id=CVE-2025-53881
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-02T17:15:08Z/
url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53881
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-53881
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3v8-dkfk-2bfr
2
url VCID-j9ru-hveg-jke3
vulnerability_id VCID-j9ru-hveg-jke3
summary A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30232
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09332
published_at 2026-04-21T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0929
published_at 2026-04-13T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09182
published_at 2026-04-16T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0918
published_at 2026-04-18T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09284
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09202
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09278
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09322
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09331
published_at 2026-04-11T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09303
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30232
1
reference_url https://security.archlinux.org/ASA-202503-1
reference_id ASA-202503-1
reference_type
scores
url https://security.archlinux.org/ASA-202503-1
2
reference_url https://security.archlinux.org/AVG-2859
reference_id AVG-2859
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2859
3
reference_url https://www.exim.org/static/doc/security/CVE-2025-30232.txt
reference_id CVE-2025-30232.txt
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T14:37:01Z/
url https://www.exim.org/static/doc/security/CVE-2025-30232.txt
4
reference_url https://usn.ubuntu.com/7373-1/
reference_id USN-7373-1
reference_type
scores
url https://usn.ubuntu.com/7373-1/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.1-2?distro=trixie
purl pkg:deb/debian/exim4@4.98.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.1-2%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-30232
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ru-hveg-jke3
3
url VCID-kh8n-3nvr-quhj
vulnerability_id VCID-kh8n-3nvr-quhj
summary exim: Exim: Remote heap corruption vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67896.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-67896
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25091
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24904
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25129
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24973
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25017
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-12T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24937
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29765
published_at 2026-04-16T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29743
published_at 2026-04-18T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29699
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-67896
2
reference_url https://www.openwall.com/lists/oss-security/2025/12/11/2
reference_id 2
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://www.openwall.com/lists/oss-security/2025/12/11/2
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422034
reference_id 2422034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422034
4
reference_url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
reference_id report.txt
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
5
reference_url https://exim.org/static/doc/security/
reference_id security
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://exim.org/static/doc/security/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99-7?distro=trixie
purl pkg:deb/debian/exim4@4.99-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99-7%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-67896
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh8n-3nvr-quhj
4
url VCID-ppju-pcvp-4khj
vulnerability_id VCID-ppju-pcvp-4khj
summary exim: Exim: remote SQL injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26794.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26794
reference_id
reference_type
scores
0
value 0.74732
scoring_system epss
scoring_elements 0.98852
published_at 2026-04-02T12:55:00Z
1
value 0.74732
scoring_system epss
scoring_elements 0.98869
published_at 2026-04-21T12:55:00Z
2
value 0.74732
scoring_system epss
scoring_elements 0.98854
published_at 2026-04-04T12:55:00Z
3
value 0.74732
scoring_system epss
scoring_elements 0.98855
published_at 2026-04-07T12:55:00Z
4
value 0.74732
scoring_system epss
scoring_elements 0.98856
published_at 2026-04-09T12:55:00Z
5
value 0.74732
scoring_system epss
scoring_elements 0.98859
published_at 2026-04-12T12:55:00Z
6
value 0.74732
scoring_system epss
scoring_elements 0.9886
published_at 2026-04-13T12:55:00Z
7
value 0.74732
scoring_system epss
scoring_elements 0.98864
published_at 2026-04-16T12:55:00Z
8
value 0.74732
scoring_system epss
scoring_elements 0.98865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26794
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346981
reference_id 2346981
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346981
3
reference_url https://github.com/NixOS/nixpkgs/pull/383926
reference_id 383926
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/NixOS/nixpkgs/pull/383926
4
reference_url https://github.com/openbsd/ports/commit/584d2c49addce9ca0ae67882cc16969104d7f82d
reference_id 584d2c49addce9ca0ae67882cc16969104d7f82d
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/openbsd/ports/commit/584d2c49addce9ca0ae67882cc16969104d7f82d
5
reference_url https://code.exim.org/exim/exim/commit/bfe32b5c6ea033736a26da8421513206db9fe305
reference_id bfe32b5c6ea033736a26da8421513206db9fe305
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://code.exim.org/exim/exim/commit/bfe32b5c6ea033736a26da8421513206db9fe305
6
reference_url https://www.exim.org/static/doc/security/CVE-2025-26794.txt
reference_id CVE-2025-26794.txt
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://www.exim.org/static/doc/security/CVE-2025-26794.txt
7
reference_url https://exim.org
reference_id exim.org
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://exim.org
8
reference_url https://github.com/Exim/exim/wiki/EximSecurity
reference_id EximSecurity
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/Exim/exim/wiki/EximSecurity
9
reference_url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
reference_id report.txt
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
10
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1237424
reference_id show_bug.cgi?id=1237424
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1237424
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98-4?distro=trixie
purl pkg:deb/debian/exim4@4.98-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98-4%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-26794
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppju-pcvp-4khj
5
url VCID-q8zm-fhfq-sfan
vulnerability_id VCID-q8zm-fhfq-sfan
summary A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3620
reference_id
reference_type
scores
0
value 0.01227
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-02T12:55:00Z
1
value 0.01227
scoring_system epss
scoring_elements 0.79114
published_at 2026-04-04T12:55:00Z
2
value 0.01227
scoring_system epss
scoring_elements 0.79099
published_at 2026-04-07T12:55:00Z
3
value 0.01227
scoring_system epss
scoring_elements 0.79124
published_at 2026-04-08T12:55:00Z
4
value 0.01227
scoring_system epss
scoring_elements 0.79131
published_at 2026-04-09T12:55:00Z
5
value 0.01227
scoring_system epss
scoring_elements 0.79156
published_at 2026-04-18T12:55:00Z
6
value 0.01227
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-12T12:55:00Z
7
value 0.01227
scoring_system epss
scoring_elements 0.79132
published_at 2026-04-13T12:55:00Z
8
value 0.01227
scoring_system epss
scoring_elements 0.79159
published_at 2026-04-16T12:55:00Z
9
value 0.01227
scoring_system epss
scoring_elements 0.79155
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3620
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022556
reference_id 1022556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022556
2
reference_url https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
reference_id 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU/
reference_id 667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
reference_id EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
5
reference_url https://vuldb.com/?id.211919
reference_id ?id.211919
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://vuldb.com/?id.211919
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM/
reference_id XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-7?distro=trixie
purl pkg:deb/debian/exim4@4.96-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-3620
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8zm-fhfq-sfan
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie