{"url":"http://public2.vulnerablecode.io/api/packages/1058370?format=json","purl":"pkg:deb/debian/fusiondirectory@1.0.8.2-5%2Bdeb8u1","type":"deb","namespace":"debian","name":"fusiondirectory","version":"1.0.8.2-5+deb8u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.3-4+deb11u1","latest_non_vulnerable_version":"1.3-4+deb11u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95214?format=json","vulnerability_id":"VCID-6uq5-8b85-7qc3","summary":"Fusiondirectory 1.3 suffers from Improper Session Handling.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36179","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35279","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36179"},{"reference_url":"https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/","reference_id":"cve-advisory-full-disclosure-multiple-vulnerabilities","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:17:22Z/"}],"url":"https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/"},{"reference_url":"http://fusiondirectory.com","reference_id":"fusiondirectory.com","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:17:22Z/"}],"url":"http://fusiondirectory.com"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:17:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00009.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1058373?format=json","purl":"pkg:deb/debian/fusiondirectory@1.3-4%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/fusiondirectory@1.3-4%252Bdeb11u1"}],"aliases":["CVE-2022-36179"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6uq5-8b85-7qc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95215?format=json","vulnerability_id":"VCID-9gy1-x64d-a7d7","summary":"Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36180","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38285","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36180"},{"reference_url":"https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/","reference_id":"cve-advisory-full-disclosure-multiple-vulnerabilities","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:16:08Z/"}],"url":"https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/"},{"reference_url":"http://fusiondirectory.com","reference_id":"fusiondirectory.com","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:16:08Z/"}],"url":"http://fusiondirectory.com"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-29T15:16:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00009.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1058373?format=json","purl":"pkg:deb/debian/fusiondirectory@1.3-4%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/fusiondirectory@1.3-4%252Bdeb11u1"}],"aliases":["CVE-2022-36180"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gy1-x64d-a7d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93884?format=json","vulnerability_id":"VCID-vppv-uve4-bqbx","summary":"Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing the case-insensitive substring \"success\" when an arbitrary password is provided.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11187","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59154","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11187"},{"reference_url":"https://usn.ubuntu.com/4609-1/","reference_id":"USN-4609-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4609-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1058373?format=json","purl":"pkg:deb/debian/fusiondirectory@1.3-4%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/fusiondirectory@1.3-4%252Bdeb11u1"}],"aliases":["CVE-2019-11187"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vppv-uve4-bqbx"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/fusiondirectory@1.0.8.2-5%252Bdeb8u1"}