Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
Typedeb
Namespacedebian
Nameroundcube
Version1.1.2+dfsg.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.3+dfsg.1-1
Latest_non_vulnerable_version1.6.15+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-23v8-vzqs-j3f6
vulnerability_id VCID-23v8-vzqs-j3f6
summary program/steps/addressbook/photo.inc in Roundcube Webmail before 1.0.6 and 1.1.x before 1.1.2 allows remote authenticated users to read arbitrary files via the _alt parameter when uploading a vCard.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5382
reference_id
reference_type
scores
0
value 0.01037
scoring_system epss
scoring_elements 0.77347
published_at 2026-04-01T12:55:00Z
1
value 0.01037
scoring_system epss
scoring_elements 0.77354
published_at 2026-04-02T12:55:00Z
2
value 0.01037
scoring_system epss
scoring_elements 0.77381
published_at 2026-04-04T12:55:00Z
3
value 0.01037
scoring_system epss
scoring_elements 0.77361
published_at 2026-04-07T12:55:00Z
4
value 0.01037
scoring_system epss
scoring_elements 0.77391
published_at 2026-04-08T12:55:00Z
5
value 0.01037
scoring_system epss
scoring_elements 0.774
published_at 2026-04-09T12:55:00Z
6
value 0.01037
scoring_system epss
scoring_elements 0.77427
published_at 2026-04-11T12:55:00Z
7
value 0.01037
scoring_system epss
scoring_elements 0.77406
published_at 2026-04-12T12:55:00Z
8
value 0.01037
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-13T12:55:00Z
9
value 0.01037
scoring_system epss
scoring_elements 0.77442
published_at 2026-04-16T12:55:00Z
10
value 0.01037
scoring_system epss
scoring_elements 0.77441
published_at 2026-04-18T12:55:00Z
11
value 0.01037
scoring_system epss
scoring_elements 0.77433
published_at 2026-04-21T12:55:00Z
12
value 0.01037
scoring_system epss
scoring_elements 0.77467
published_at 2026-04-24T12:55:00Z
13
value 0.01037
scoring_system epss
scoring_elements 0.77474
published_at 2026-04-26T12:55:00Z
14
value 0.01037
scoring_system epss
scoring_elements 0.77486
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5382
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5382
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791643
reference_id 791643
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791643
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
purl pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.2%252Bdfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5382
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23v8-vzqs-j3f6
1
url VCID-76t7-q4pa-gkct
vulnerability_id VCID-76t7-q4pa-gkct
summary Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5381
reference_id
reference_type
scores
0
value 0.01182
scoring_system epss
scoring_elements 0.78708
published_at 2026-04-01T12:55:00Z
1
value 0.01182
scoring_system epss
scoring_elements 0.78714
published_at 2026-04-02T12:55:00Z
2
value 0.01182
scoring_system epss
scoring_elements 0.78745
published_at 2026-04-04T12:55:00Z
3
value 0.01182
scoring_system epss
scoring_elements 0.78727
published_at 2026-04-07T12:55:00Z
4
value 0.01182
scoring_system epss
scoring_elements 0.78753
published_at 2026-04-08T12:55:00Z
5
value 0.01182
scoring_system epss
scoring_elements 0.7876
published_at 2026-04-09T12:55:00Z
6
value 0.01182
scoring_system epss
scoring_elements 0.78784
published_at 2026-04-18T12:55:00Z
7
value 0.01182
scoring_system epss
scoring_elements 0.78766
published_at 2026-04-12T12:55:00Z
8
value 0.01182
scoring_system epss
scoring_elements 0.78758
published_at 2026-04-13T12:55:00Z
9
value 0.01182
scoring_system epss
scoring_elements 0.78786
published_at 2026-04-16T12:55:00Z
10
value 0.01182
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-21T12:55:00Z
11
value 0.01182
scoring_system epss
scoring_elements 0.78808
published_at 2026-04-24T12:55:00Z
12
value 0.01182
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-26T12:55:00Z
13
value 0.01182
scoring_system epss
scoring_elements 0.78832
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5381
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5381
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791643
reference_id 791643
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791643
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
purl pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.2%252Bdfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-5381
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76t7-q4pa-gkct
2
url VCID-kf54-x29g-63fb
vulnerability_id VCID-kf54-x29g-63fb
summary Absolute path traversal vulnerability in program/steps/addressbook/photo.inc in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote authenticated users to read arbitrary files via a full pathname in the _alt parameter, related to contact photo handling.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8794
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52286
published_at 2026-04-26T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52279
published_at 2026-04-24T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52208
published_at 2026-04-01T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52251
published_at 2026-04-29T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.52278
published_at 2026-04-04T12:55:00Z
5
value 0.00288
scoring_system epss
scoring_elements 0.5224
published_at 2026-04-07T12:55:00Z
6
value 0.00288
scoring_system epss
scoring_elements 0.52292
published_at 2026-04-08T12:55:00Z
7
value 0.00288
scoring_system epss
scoring_elements 0.52288
published_at 2026-04-09T12:55:00Z
8
value 0.00288
scoring_system epss
scoring_elements 0.52338
published_at 2026-04-11T12:55:00Z
9
value 0.00288
scoring_system epss
scoring_elements 0.52322
published_at 2026-04-12T12:55:00Z
10
value 0.00288
scoring_system epss
scoring_elements 0.52308
published_at 2026-04-13T12:55:00Z
11
value 0.00288
scoring_system epss
scoring_elements 0.52346
published_at 2026-04-16T12:55:00Z
12
value 0.00288
scoring_system epss
scoring_elements 0.52349
published_at 2026-04-18T12:55:00Z
13
value 0.00288
scoring_system epss
scoring_elements 0.52333
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8794
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8794
2
reference_url https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
reference_id
reference_type
scores
url https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
3
reference_url http://trac.roundcube.net/changeset/6ccd4c54b/github
reference_id
reference_type
scores
url http://trac.roundcube.net/changeset/6ccd4c54b/github
4
reference_url http://trac.roundcube.net/changeset/e84fafcec/github
reference_id
reference_type
scores
url http://trac.roundcube.net/changeset/e84fafcec/github
5
reference_url http://trac.roundcube.net/ticket/1490379
reference_id
reference_type
scores
url http://trac.roundcube.net/ticket/1490379
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:roundcube_webmail:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:roundcube_webmail:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:1.1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8794
reference_id CVE-2015-8794
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8794
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
purl pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.2%252Bdfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8794
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kf54-x29g-63fb
3
url VCID-z7fn-ubfx-g3em
vulnerability_id VCID-z7fn-ubfx-g3em
summary Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8793
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.50971
published_at 2026-04-29T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51011
published_at 2026-04-26T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.5094
published_at 2026-04-01T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50994
published_at 2026-04-02T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51019
published_at 2026-04-04T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.50976
published_at 2026-04-07T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51033
published_at 2026-04-08T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5103
published_at 2026-04-09T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51073
published_at 2026-04-11T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51051
published_at 2026-04-12T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51034
published_at 2026-04-13T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51072
published_at 2026-04-16T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51078
published_at 2026-04-18T12:55:00Z
13
value 0.00276
scoring_system epss
scoring_elements 0.51055
published_at 2026-04-21T12:55:00Z
14
value 0.00276
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8793
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8793
2
reference_url https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
reference_id
reference_type
scores
url https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
3
reference_url http://trac.roundcube.net/ticket/1490417
reference_id
reference_type
scores
url http://trac.roundcube.net/ticket/1490417
4
reference_url http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
reference_id
reference_type
scores
url http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8793
reference_id CVE-2015-8793
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8793
fixed_packages
0
url pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
purl pkg:deb/debian/roundcube@1.1.2%2Bdfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.2%252Bdfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8793
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7fn-ubfx-g3em
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.1.2%252Bdfsg.1-1%3Fdistro=trixie