Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/enigmail@2:2.0.7-1?distro=bullseye
Typedeb
Namespacedebian
Nameenigmail
Version2:2.0.7-1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:2.0.11+ds1-1
Latest_non_vulnerable_version2:2.2.4-0.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9cm4-mu3q-2yey
vulnerability_id VCID-9cm4-mu3q-2yey
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2018/06/08/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/06/08/2
1
reference_url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12020.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12020.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12020
reference_id
reference_type
scores
0
value 0.01725
scoring_system epss
scoring_elements 0.82498
published_at 2026-04-26T12:55:00Z
1
value 0.01725
scoring_system epss
scoring_elements 0.82424
published_at 2026-04-13T12:55:00Z
2
value 0.01725
scoring_system epss
scoring_elements 0.82459
published_at 2026-04-16T12:55:00Z
3
value 0.01725
scoring_system epss
scoring_elements 0.82461
published_at 2026-04-18T12:55:00Z
4
value 0.01725
scoring_system epss
scoring_elements 0.82466
published_at 2026-04-21T12:55:00Z
5
value 0.01725
scoring_system epss
scoring_elements 0.82487
published_at 2026-04-24T12:55:00Z
6
value 0.02796
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-02T12:55:00Z
7
value 0.02796
scoring_system epss
scoring_elements 0.86037
published_at 2026-04-01T12:55:00Z
8
value 0.02796
scoring_system epss
scoring_elements 0.86065
published_at 2026-04-04T12:55:00Z
9
value 0.02925
scoring_system epss
scoring_elements 0.86399
published_at 2026-04-09T12:55:00Z
10
value 0.02925
scoring_system epss
scoring_elements 0.86413
published_at 2026-04-11T12:55:00Z
11
value 0.02925
scoring_system epss
scoring_elements 0.86411
published_at 2026-04-12T12:55:00Z
12
value 0.02925
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-07T12:55:00Z
13
value 0.02925
scoring_system epss
scoring_elements 0.86389
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12020
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
5
reference_url https://dev.gnupg.org/T4012
reference_id
reference_type
scores
url https://dev.gnupg.org/T4012
6
reference_url http://seclists.org/fulldisclosure/2019/Apr/38
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Apr/38
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired
9
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
10
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
11
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
12
reference_url https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
reference_id
reference_type
scores
url https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
13
reference_url https://usn.ubuntu.com/3964-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3964-1/
14
reference_url https://www.debian.org/security/2018/dsa-4222
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4222
15
reference_url https://www.debian.org/security/2018/dsa-4223
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4223
16
reference_url https://www.debian.org/security/2018/dsa-4224
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4224
17
reference_url http://www.openwall.com/lists/oss-security/2019/04/30/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/04/30/4
18
reference_url http://www.securityfocus.com/bid/104450
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104450
19
reference_url http://www.securitytracker.com/id/1041051
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041051
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1589620
reference_id 1589620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1589620
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901088
reference_id 901088
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901088
22
reference_url https://security.archlinux.org/ASA-201806-8
reference_id ASA-201806-8
reference_type
scores
url https://security.archlinux.org/ASA-201806-8
23
reference_url https://security.archlinux.org/AVG-713
reference_id AVG-713
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-713
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12020
reference_id CVE-2018-12020
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12020
45
reference_url https://access.redhat.com/errata/RHSA-2018:2180
reference_id RHSA-2018:2180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2180
46
reference_url https://access.redhat.com/errata/RHSA-2018:2181
reference_id RHSA-2018:2181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2181
47
reference_url https://usn.ubuntu.com/3675-1/
reference_id USN-3675-1
reference_type
scores
url https://usn.ubuntu.com/3675-1/
48
reference_url https://usn.ubuntu.com/3675-2/
reference_id USN-3675-2
reference_type
scores
url https://usn.ubuntu.com/3675-2/
49
reference_url https://usn.ubuntu.com/3675-3/
reference_id USN-3675-3
reference_type
scores
url https://usn.ubuntu.com/3675-3/
50
reference_url https://usn.ubuntu.com/USN-4839-1/
reference_id USN-USN-4839-1
reference_type
scores
url https://usn.ubuntu.com/USN-4839-1/
fixed_packages
0
url pkg:deb/debian/enigmail@2:2.0.7-1?distro=bullseye
purl pkg:deb/debian/enigmail@2:2.0.7-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.0.7-1%3Fdistro=bullseye
1
url pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
purl pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.3%3Fdistro=bullseye
aliases CVE-2018-12020
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cm4-mu3q-2yey
1
url VCID-bz74-1y1q-8qfc
vulnerability_id VCID-bz74-1y1q-8qfc
summary The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.
references
0
reference_url http://openwall.com/lists/oss-security/2018/06/13/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/06/13/10
1
reference_url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12019
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65512
published_at 2026-04-26T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65483
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65501
published_at 2026-04-24T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65371
published_at 2026-04-01T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65419
published_at 2026-04-02T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65446
published_at 2026-04-04T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65409
published_at 2026-04-07T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65462
published_at 2026-04-08T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65473
published_at 2026-04-09T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65492
published_at 2026-04-11T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.65479
published_at 2026-04-12T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-13T12:55:00Z
12
value 0.00487
scoring_system epss
scoring_elements 0.65488
published_at 2026-04-16T12:55:00Z
13
value 0.00487
scoring_system epss
scoring_elements 0.65499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12019
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12019
4
reference_url http://seclists.org/fulldisclosure/2019/Apr/38
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Apr/38
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired
7
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
8
reference_url https://www.enigmail.net/index.php/en/download/changelog
reference_id
reference_type
scores
url https://www.enigmail.net/index.php/en/download/changelog
9
reference_url http://www.openwall.com/lists/oss-security/2019/04/30/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/04/30/4
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12019
reference_id CVE-2018-12019
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12019
fixed_packages
0
url pkg:deb/debian/enigmail@2:2.0.7-1?distro=bullseye
purl pkg:deb/debian/enigmail@2:2.0.7-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.0.7-1%3Fdistro=bullseye
1
url pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
purl pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.2.4-0.3%3Fdistro=bullseye
aliases CVE-2018-12019
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz74-1y1q-8qfc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/enigmail@2:2.0.7-1%3Fdistro=bullseye