Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jkut-q94f-sbd5
Summaryroundcube webmail Alpha, with a default high verbose level ($rcmail_config['debug_level'] = 1), allows remote attackers to obtain the full path of the application via an invalid_task parameter, which leaks the path in an error message.
Aliases
0
alias CVE-2005-4368
Fixed_packages
0
url pkg:deb/debian/roundcube@0?distro=trixie
purl pkg:deb/debian/roundcube@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@0%3Fdistro=trixie
1
url pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/roundcube@1.4.15%2Bdfsg.1-1%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rdb5-bbvn-7fcq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.4.15%252Bdfsg.1-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/roundcube@1.6.5%2Bdfsg-1%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.5%252Bdfsg-1%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.13%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.13%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/roundcube@1.6.15%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/roundcube@1.6.15%252Bdfsg-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4368
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.57081
published_at 2026-04-24T12:55:00Z
1
value 0.00346
scoring_system epss
scoring_elements 0.57031
published_at 2026-04-01T12:55:00Z
2
value 0.00346
scoring_system epss
scoring_elements 0.57125
published_at 2026-04-02T12:55:00Z
3
value 0.00346
scoring_system epss
scoring_elements 0.57147
published_at 2026-04-13T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57123
published_at 2026-04-07T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57174
published_at 2026-04-08T12:55:00Z
6
value 0.00346
scoring_system epss
scoring_elements 0.57177
published_at 2026-04-09T12:55:00Z
7
value 0.00346
scoring_system epss
scoring_elements 0.57188
published_at 2026-04-11T12:55:00Z
8
value 0.00346
scoring_system epss
scoring_elements 0.57167
published_at 2026-04-12T12:55:00Z
9
value 0.00346
scoring_system epss
scoring_elements 0.57175
published_at 2026-04-16T12:55:00Z
10
value 0.00346
scoring_system epss
scoring_elements 0.57171
published_at 2026-04-18T12:55:00Z
11
value 0.00346
scoring_system epss
scoring_elements 0.5715
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4368
1
reference_url http://www.securityfocus.com/archive/1/418851/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418851/100/0/threaded
2
reference_url http://www.securityfocus.com/archive/1/419710/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/419710/100/0/threaded
3
reference_url http://www.securityfocus.com/archive/1/422168/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/422168/100/0/threaded
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:-:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:roundcube:webmail:-:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:roundcube:webmail:-:alpha:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4368
reference_id CVE-2005-4368
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-4368
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score5.0 - 5.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jkut-q94f-sbd5