{"id":"DSA-2805-1","summary":"sup-mail - remote command injection","modified":"2026-03-09T01:18:39.019421Z","published":"2013-11-27T00:00:00Z","upstream":["CVE-2013-4478","CVE-2013-4479","DEBIAN-CVE-2013-4478","DEBIAN-CVE-2013-4479"],"affected":[{"package":{"name":"sup-mail","ecosystem":"Debian:6.0","purl":"pkg:deb/debian/sup-mail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.11-2+nmu1+deb6u1"}]}],"versions":["0.11-2"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-2805-1.json"}},{"package":{"name":"sup-mail","ecosystem":"Debian:7","purl":"pkg:deb/debian/sup-mail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.1+git20120407.aaa852f-1+deb7u1"}]}],"versions":["0.12.1+git20120407.aaa852f-1"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-2805-1.json"}}],"schema_version":"1.7.3"}