Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
Typedeb
Namespacedebian
Nameroundcube
Version1.1.1+dfsg.1-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.2+dfsg.1-1
Latest_non_vulnerable_version1.6.15+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-489e-j7sj-5kgv
vulnerability_id VCID-489e-j7sj-5kgv
summary The DBMail driver in the Password plugin in Roundcube before 1.1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the password.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2180
reference_id
reference_type
scores
0
value 0.02743
scoring_system epss
scoring_elements 0.8592
published_at 2026-04-01T12:55:00Z
1
value 0.02743
scoring_system epss
scoring_elements 0.85932
published_at 2026-04-02T12:55:00Z
2
value 0.02743
scoring_system epss
scoring_elements 0.85948
published_at 2026-04-04T12:55:00Z
3
value 0.02743
scoring_system epss
scoring_elements 0.8595
published_at 2026-04-07T12:55:00Z
4
value 0.02743
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-08T12:55:00Z
5
value 0.02743
scoring_system epss
scoring_elements 0.85979
published_at 2026-04-09T12:55:00Z
6
value 0.02743
scoring_system epss
scoring_elements 0.85993
published_at 2026-04-11T12:55:00Z
7
value 0.02743
scoring_system epss
scoring_elements 0.85991
published_at 2026-04-12T12:55:00Z
8
value 0.02743
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-13T12:55:00Z
9
value 0.02743
scoring_system epss
scoring_elements 0.86005
published_at 2026-04-16T12:55:00Z
10
value 0.02743
scoring_system epss
scoring_elements 0.8601
published_at 2026-04-18T12:55:00Z
11
value 0.02743
scoring_system epss
scoring_elements 0.86
published_at 2026-04-21T12:55:00Z
12
value 0.02743
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2180
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2180
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
purl pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.1%252Bdfsg.1-2%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-2180
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-489e-j7sj-5kgv
1
url VCID-9uqr-ph81-gfef
vulnerability_id VCID-9uqr-ph81-gfef
summary Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2181
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73379
published_at 2026-04-01T12:55:00Z
1
value 0.00764
scoring_system epss
scoring_elements 0.73388
published_at 2026-04-02T12:55:00Z
2
value 0.00764
scoring_system epss
scoring_elements 0.7341
published_at 2026-04-04T12:55:00Z
3
value 0.00764
scoring_system epss
scoring_elements 0.73382
published_at 2026-04-07T12:55:00Z
4
value 0.00764
scoring_system epss
scoring_elements 0.73419
published_at 2026-04-08T12:55:00Z
5
value 0.00764
scoring_system epss
scoring_elements 0.73433
published_at 2026-04-09T12:55:00Z
6
value 0.00764
scoring_system epss
scoring_elements 0.73456
published_at 2026-04-11T12:55:00Z
7
value 0.00764
scoring_system epss
scoring_elements 0.73436
published_at 2026-04-12T12:55:00Z
8
value 0.00764
scoring_system epss
scoring_elements 0.73429
published_at 2026-04-13T12:55:00Z
9
value 0.00764
scoring_system epss
scoring_elements 0.73472
published_at 2026-04-16T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.7348
published_at 2026-04-18T12:55:00Z
11
value 0.00764
scoring_system epss
scoring_elements 0.73474
published_at 2026-04-21T12:55:00Z
12
value 0.00764
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2181
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2181
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
purl pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.1%252Bdfsg.1-2%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-2181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uqr-ph81-gfef
2
url VCID-yv5x-shsw-57cv
vulnerability_id VCID-yv5x-shsw-57cv
summary Multiple cross-site request forgery (CSRF) vulnerabilities in Roundcube Webmail before 1.0.4 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to (1) address book operations or the (2) ACL or (3) Managesieve plugins.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9587
reference_id
reference_type
scores
0
value 0.03651
scoring_system epss
scoring_elements 0.87814
published_at 2026-04-01T12:55:00Z
1
value 0.03651
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-02T12:55:00Z
2
value 0.03651
scoring_system epss
scoring_elements 0.87836
published_at 2026-04-04T12:55:00Z
3
value 0.03651
scoring_system epss
scoring_elements 0.87839
published_at 2026-04-07T12:55:00Z
4
value 0.03651
scoring_system epss
scoring_elements 0.87861
published_at 2026-04-08T12:55:00Z
5
value 0.03651
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-09T12:55:00Z
6
value 0.03651
scoring_system epss
scoring_elements 0.87878
published_at 2026-04-11T12:55:00Z
7
value 0.03651
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-12T12:55:00Z
8
value 0.03651
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-13T12:55:00Z
9
value 0.03651
scoring_system epss
scoring_elements 0.87885
published_at 2026-04-16T12:55:00Z
10
value 0.03651
scoring_system epss
scoring_elements 0.87883
published_at 2026-04-18T12:55:00Z
11
value 0.03651
scoring_system epss
scoring_elements 0.87882
published_at 2026-04-21T12:55:00Z
12
value 0.03651
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9587
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9587
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775576
reference_id 775576
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775576
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
purl pkg:deb/debian/roundcube@1.1.1%2Bdfsg.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.1%252Bdfsg.1-2%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9587
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yv5x-shsw-57cv
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.1%252Bdfsg.1-2%3Fdistro=trixie