Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-mta/exim@4.97.1
Typeebuild
Namespacemail-mta
Nameexim
Version4.97.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-55h7-dczu-rfhe
vulnerability_id VCID-55h7-dczu-rfhe
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42115.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42115
reference_id
reference_type
scores
0
value 0.70686
scoring_system epss
scoring_elements 0.98705
published_at 2026-04-24T12:55:00Z
1
value 0.70686
scoring_system epss
scoring_elements 0.98696
published_at 2026-04-12T12:55:00Z
2
value 0.70686
scoring_system epss
scoring_elements 0.98697
published_at 2026-04-13T12:55:00Z
3
value 0.70686
scoring_system epss
scoring_elements 0.987
published_at 2026-04-16T12:55:00Z
4
value 0.70686
scoring_system epss
scoring_elements 0.98701
published_at 2026-04-21T12:55:00Z
5
value 0.70686
scoring_system epss
scoring_elements 0.98691
published_at 2026-04-07T12:55:00Z
6
value 0.70686
scoring_system epss
scoring_elements 0.98692
published_at 2026-04-08T12:55:00Z
7
value 0.70686
scoring_system epss
scoring_elements 0.98693
published_at 2026-04-09T12:55:00Z
8
value 0.70686
scoring_system epss
scoring_elements 0.98695
published_at 2026-04-11T12:55:00Z
9
value 0.72904
scoring_system epss
scoring_elements 0.98772
published_at 2026-04-04T12:55:00Z
10
value 0.72904
scoring_system epss
scoring_elements 0.98769
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241525
reference_id 2241525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241525
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1469/
reference_id ZDI-23-1469
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-09-20T19:32:20Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1469/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-42115
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55h7-dczu-rfhe
1
url VCID-5e2k-ure4-wfdf
vulnerability_id VCID-5e2k-ure4-wfdf
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
reference_id
reference_type
scores
0
value 0.0735
scoring_system epss
scoring_elements 0.91671
published_at 2026-04-02T12:55:00Z
1
value 0.0735
scoring_system epss
scoring_elements 0.91722
published_at 2026-04-21T12:55:00Z
2
value 0.0735
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-24T12:55:00Z
3
value 0.0735
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-18T12:55:00Z
4
value 0.0735
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-04T12:55:00Z
5
value 0.0735
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-07T12:55:00Z
6
value 0.0735
scoring_system epss
scoring_elements 0.91698
published_at 2026-04-08T12:55:00Z
7
value 0.0735
scoring_system epss
scoring_elements 0.91705
published_at 2026-04-09T12:55:00Z
8
value 0.0735
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-11T12:55:00Z
9
value 0.0735
scoring_system epss
scoring_elements 0.91711
published_at 2026-04-12T12:55:00Z
10
value 0.0735
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
reference_id 2241531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
reference_id ZDI-23-1471
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-03T16:58:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-42117
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5e2k-ure4-wfdf
2
url VCID-f998-369d-r3ds
vulnerability_id VCID-f998-369d-r3ds
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42116.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42116
reference_id
reference_type
scores
0
value 0.06734
scoring_system epss
scoring_elements 0.91234
published_at 2026-04-02T12:55:00Z
1
value 0.06734
scoring_system epss
scoring_elements 0.91316
published_at 2026-04-24T12:55:00Z
2
value 0.06734
scoring_system epss
scoring_elements 0.91304
published_at 2026-04-18T12:55:00Z
3
value 0.06734
scoring_system epss
scoring_elements 0.91306
published_at 2026-04-21T12:55:00Z
4
value 0.06734
scoring_system epss
scoring_elements 0.91243
published_at 2026-04-04T12:55:00Z
5
value 0.06734
scoring_system epss
scoring_elements 0.9125
published_at 2026-04-07T12:55:00Z
6
value 0.06734
scoring_system epss
scoring_elements 0.91263
published_at 2026-04-08T12:55:00Z
7
value 0.06734
scoring_system epss
scoring_elements 0.9127
published_at 2026-04-09T12:55:00Z
8
value 0.06734
scoring_system epss
scoring_elements 0.91277
published_at 2026-04-11T12:55:00Z
9
value 0.06734
scoring_system epss
scoring_elements 0.9128
published_at 2026-04-12T12:55:00Z
10
value 0.06734
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241528
reference_id 2241528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241528
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
reference_id ZDI-23-1470
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T15:02:42Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-42116
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f998-369d-r3ds
3
url VCID-puuy-w6ze-9kc7
vulnerability_id VCID-puuy-w6ze-9kc7
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
reference_id
reference_type
scores
0
value 0.00731
scoring_system epss
scoring_elements 0.72637
published_at 2026-04-02T12:55:00Z
1
value 0.00731
scoring_system epss
scoring_elements 0.72767
published_at 2026-04-24T12:55:00Z
2
value 0.00731
scoring_system epss
scoring_elements 0.72733
published_at 2026-04-18T12:55:00Z
3
value 0.00731
scoring_system epss
scoring_elements 0.72725
published_at 2026-04-21T12:55:00Z
4
value 0.00731
scoring_system epss
scoring_elements 0.72654
published_at 2026-04-04T12:55:00Z
5
value 0.00731
scoring_system epss
scoring_elements 0.72632
published_at 2026-04-07T12:55:00Z
6
value 0.00731
scoring_system epss
scoring_elements 0.72671
published_at 2026-04-08T12:55:00Z
7
value 0.00731
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-09T12:55:00Z
8
value 0.00731
scoring_system epss
scoring_elements 0.72707
published_at 2026-04-11T12:55:00Z
9
value 0.00731
scoring_system epss
scoring_elements 0.7269
published_at 2026-04-12T12:55:00Z
10
value 0.00731
scoring_system epss
scoring_elements 0.7268
published_at 2026-04-13T12:55:00Z
11
value 0.00731
scoring_system epss
scoring_elements 0.72722
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
reference_id 2241542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
reference_id ZDI-23-1473
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T16:29:47Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-42119
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-puuy-w6ze-9kc7
4
url VCID-qupq-a4jw-bbhh
vulnerability_id VCID-qupq-a4jw-bbhh
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42114.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42114
reference_id
reference_type
scores
0
value 0.13895
scoring_system epss
scoring_elements 0.94276
published_at 2026-04-02T12:55:00Z
1
value 0.13895
scoring_system epss
scoring_elements 0.94331
published_at 2026-04-24T12:55:00Z
2
value 0.13895
scoring_system epss
scoring_elements 0.94328
published_at 2026-04-18T12:55:00Z
3
value 0.13895
scoring_system epss
scoring_elements 0.94327
published_at 2026-04-21T12:55:00Z
4
value 0.13895
scoring_system epss
scoring_elements 0.94287
published_at 2026-04-04T12:55:00Z
5
value 0.13895
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-07T12:55:00Z
6
value 0.13895
scoring_system epss
scoring_elements 0.94298
published_at 2026-04-08T12:55:00Z
7
value 0.13895
scoring_system epss
scoring_elements 0.94302
published_at 2026-04-09T12:55:00Z
8
value 0.13895
scoring_system epss
scoring_elements 0.94306
published_at 2026-04-11T12:55:00Z
9
value 0.13895
scoring_system epss
scoring_elements 0.94307
published_at 2026-04-12T12:55:00Z
10
value 0.13895
scoring_system epss
scoring_elements 0.94308
published_at 2026-04-13T12:55:00Z
11
value 0.13895
scoring_system epss
scoring_elements 0.94323
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42114
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241538
reference_id 2241538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241538
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
reference_id ZDI-23-1468
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T17:07:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-42114
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qupq-a4jw-bbhh
5
url VCID-stsb-pwen-87g7
vulnerability_id VCID-stsb-pwen-87g7
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51766
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-02T12:55:00Z
1
value 0.01642
scoring_system epss
scoring_elements 0.81921
published_at 2026-04-04T12:55:00Z
2
value 0.01642
scoring_system epss
scoring_elements 0.81917
published_at 2026-04-07T12:55:00Z
3
value 0.01642
scoring_system epss
scoring_elements 0.81944
published_at 2026-04-08T12:55:00Z
4
value 0.01642
scoring_system epss
scoring_elements 0.81951
published_at 2026-04-09T12:55:00Z
5
value 0.01642
scoring_system epss
scoring_elements 0.81971
published_at 2026-04-11T12:55:00Z
6
value 0.01642
scoring_system epss
scoring_elements 0.8196
published_at 2026-04-12T12:55:00Z
7
value 0.01642
scoring_system epss
scoring_elements 0.81955
published_at 2026-04-13T12:55:00Z
8
value 0.01642
scoring_system epss
scoring_elements 0.8199
published_at 2026-04-18T12:55:00Z
9
value 0.01642
scoring_system epss
scoring_elements 0.81992
published_at 2026-04-21T12:55:00Z
10
value 0.01642
scoring_system epss
scoring_elements 0.82015
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51766
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51766
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059387
reference_id 1059387
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059387
3
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
4
reference_url https://usn.ubuntu.com/6611-1/
reference_id USN-6611-1
reference_type
scores
url https://usn.ubuntu.com/6611-1/
fixed_packages
0
url pkg:ebuild/mail-mta/exim@4.97.1
purl pkg:ebuild/mail-mta/exim@4.97.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1
aliases CVE-2023-51766
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stsb-pwen-87g7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-mta/exim@4.97.1