Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-hs3u-et99-4ucs
SummaryAn issue was discovered in password-store.sh in pass in Simple Password Store 1.7.x before 1.7.2. The signature verification routine parses the output of GnuPG with an incomplete regular expression, which allows remote attackers to spoof file signatures on configuration files and extension scripts. Modifying the configuration file allows the attacker to inject additional encryption keys under their control, thereby disclosing passwords to the attacker. Modifying the extension scripts allows the attacker arbitrary code execution.
Aliases
0
alias CVE-2018-12356
Fixed_packages
0
url pkg:alpm/archlinux/firefox@61.0-1
purl pkg:alpm/archlinux/firefox@61.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@61.0-1
1
url pkg:alpm/archlinux/pass@1.7.2-1
purl pkg:alpm/archlinux/pass@1.7.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/pass@1.7.2-1
2
url pkg:deb/debian/password-store@1.7.2-1?distro=trixie
purl pkg:deb/debian/password-store@1.7.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.2-1%3Fdistro=trixie
3
url pkg:deb/debian/password-store@1.7.3-2?distro=trixie
purl pkg:deb/debian/password-store@1.7.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.3-2%3Fdistro=trixie
4
url pkg:deb/debian/password-store@1.7.3-2
purl pkg:deb/debian/password-store@1.7.3-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.3-2
5
url pkg:deb/debian/password-store@1.7.4-6?distro=trixie
purl pkg:deb/debian/password-store@1.7.4-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.4-6%3Fdistro=trixie
6
url pkg:deb/debian/password-store@1.7.4-7?distro=trixie
purl pkg:deb/debian/password-store@1.7.4-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.4-7%3Fdistro=trixie
7
url pkg:deb/debian/password-store@1.7.4-8?distro=trixie
purl pkg:deb/debian/password-store@1.7.4-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.7.4-8%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/firefox@60.0.2-1
purl pkg:alpm/archlinux/firefox@60.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ybd-wjmm-c7hm
1
vulnerability VCID-41zd-qkbf-bucq
2
vulnerability VCID-4ewq-72xf-rfhq
3
vulnerability VCID-89t2-wzrw-nycq
4
vulnerability VCID-a79m-8sp3-v3dh
5
vulnerability VCID-bfdm-fkfv-nfch
6
vulnerability VCID-csm4-qspw-83da
7
vulnerability VCID-f79a-dxkf-8yeu
8
vulnerability VCID-gw8k-uktt-1qft
9
vulnerability VCID-h34x-5zq6-73a3
10
vulnerability VCID-hs3u-et99-4ucs
11
vulnerability VCID-j7j8-g9du-mqfz
12
vulnerability VCID-n454-esxc-ckhd
13
vulnerability VCID-nuqf-n5jd-cke6
14
vulnerability VCID-sr45-86k8-8ybs
15
vulnerability VCID-u23v-7afk-qben
16
vulnerability VCID-ym7a-e9b5-5ygm
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@60.0.2-1
1
url pkg:alpm/archlinux/pass@1.7.1-1
purl pkg:alpm/archlinux/pass@1.7.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hs3u-et99-4ucs
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/pass@1.7.1-1
2
url pkg:deb/debian/password-store@1.6.3-1~bpo70%2B1
purl pkg:deb/debian/password-store@1.6.3-1~bpo70%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hs3u-et99-4ucs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.6.3-1~bpo70%252B1
3
url pkg:deb/debian/password-store@1.6.3-3
purl pkg:deb/debian/password-store@1.6.3-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hs3u-et99-4ucs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.6.3-3
4
url pkg:deb/debian/password-store@1.6.5-7
purl pkg:deb/debian/password-store@1.6.5-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hs3u-et99-4ucs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/password-store@1.6.5-7
References
0
reference_url http://openwall.com/lists/oss-security/2018/06/14/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/06/14/3
1
reference_url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12356
reference_id
reference_type
scores
0
value 0.02614
scoring_system epss
scoring_elements 0.85671
published_at 2026-04-21T12:55:00Z
1
value 0.02614
scoring_system epss
scoring_elements 0.85651
published_at 2026-04-12T12:55:00Z
2
value 0.02614
scoring_system epss
scoring_elements 0.85648
published_at 2026-04-13T12:55:00Z
3
value 0.02614
scoring_system epss
scoring_elements 0.8567
published_at 2026-04-16T12:55:00Z
4
value 0.02614
scoring_system epss
scoring_elements 0.85675
published_at 2026-04-18T12:55:00Z
5
value 0.02614
scoring_system epss
scoring_elements 0.85574
published_at 2026-04-01T12:55:00Z
6
value 0.02614
scoring_system epss
scoring_elements 0.85586
published_at 2026-04-02T12:55:00Z
7
value 0.02614
scoring_system epss
scoring_elements 0.85604
published_at 2026-04-04T12:55:00Z
8
value 0.02614
scoring_system epss
scoring_elements 0.8561
published_at 2026-04-07T12:55:00Z
9
value 0.02614
scoring_system epss
scoring_elements 0.85629
published_at 2026-04-08T12:55:00Z
10
value 0.02614
scoring_system epss
scoring_elements 0.8564
published_at 2026-04-09T12:55:00Z
11
value 0.02614
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12356
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12356
4
reference_url http://seclists.org/fulldisclosure/2019/Apr/38
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Apr/38
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired
7
reference_url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
reference_id
reference_type
scores
url https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
8
reference_url https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d
reference_id
reference_type
scores
url https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d
9
reference_url https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html
reference_id
reference_type
scores
url https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html
10
reference_url http://www.openwall.com/lists/oss-security/2019/04/30/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/04/30/4
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901574
reference_id 901574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901574
12
reference_url https://security.archlinux.org/ASA-201806-11
reference_id ASA-201806-11
reference_type
scores
url https://security.archlinux.org/ASA-201806-11
13
reference_url https://security.archlinux.org/ASA-201806-14
reference_id ASA-201806-14
reference_type
scores
url https://security.archlinux.org/ASA-201806-14
14
reference_url https://security.archlinux.org/AVG-720
reference_id AVG-720
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-720
15
reference_url https://security.archlinux.org/AVG-727
reference_id AVG-727
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-727
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simple_password_store_project:simple_password_store:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:simple_password_store_project:simple_password_store:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simple_password_store_project:simple_password_store:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12356
reference_id CVE-2018-12356
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12356
Weaknesses
0
cwe_id 347
name Improper Verification of Cryptographic Signature
description The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Exploits
Severity_range_score7.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-hs3u-et99-4ucs