Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036800?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036800?format=api", "purl": "pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%2Bsqueeze1", "type": "deb", "namespace": "debian", "name": "heimdal", "version": "1.4.0~git20100726.dfsg.1-2+squeeze1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "7.7.0+dfsg-2+deb11u3", "latest_non_vulnerable_version": "7.7.0+dfsg-2+deb11u3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api", "vulnerability_id": "VCID-21hz-xvek-73cd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83808", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877", "reference_id": "1705877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966", "reference_id": "928966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3976-1/", "reference_id": "USN-3976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-1/" }, { "reference_url": "https://usn.ubuntu.com/3976-2/", "reference_id": "USN-3976-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-2/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3" } ], "aliases": [ "CVE-2018-16860" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api", "vulnerability_id": "VCID-3du2-evy8-jfa1", "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08257", "scoring_system": "epss", "scoring_elements": "0.92245", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.9254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92542", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267", "reference_id": "1024267", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960", "reference_id": "2140960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960" }, { "reference_url": "https://web.mit.edu/kerberos/advisories/", "reference_id": "advisories", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/advisories/" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html", "reference_id": "CVE-2022-42898.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-42898.html" }, { "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c", "reference_id": "GHSA-64mq-fvfj-5x3c", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://security.gentoo.org/glsa/202405-11", "reference_id": "GLSA-202405-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-11" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/", "reference_id": "krb5-1.19", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.19/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/", "reference_id": "ntap-20230223-0001", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230223-0001/" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt", "reference_id": "README-1.20.1.txt", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637", "reference_id": "RHSA-2022:8637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638", "reference_id": "RHSA-2022:8638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639", "reference_id": "RHSA-2022:8639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640", "reference_id": "RHSA-2022:8640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641", "reference_id": "RHSA-2022:8641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8641" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648", "reference_id": "RHSA-2022:8648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662", "reference_id": "RHSA-2022:8662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663", "reference_id": "RHSA-2022:8663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669", "reference_id": "RHSA-2022:8669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029", "reference_id": "RHSA-2022:9029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9029" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203", "reference_id": "show_bug.cgi?id=15203", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5828-1/", "reference_id": "USN-5828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5828-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2022-42898" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49838?format=api", "vulnerability_id": "VCID-5tkj-88u2-83ha", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50521", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50545", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50512", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50493", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50496", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52127", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5287", "reference_id": "dsa-5287", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5287" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx", "reference_id": "GHSA-mgqr-gvh6-23cx", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5766-1/", "reference_id": "USN-5766-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5766-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2022-41916" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkj-88u2-83ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93251?format=api", "vulnerability_id": "VCID-81xv-v927-8fdz", "summary": "The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48145", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48095", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48166", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48153", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3" } ], "aliases": [ "CVE-2017-6594" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81xv-v927-8fdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=api", "vulnerability_id": "VCID-bc1t-hzu5-bffd", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78838", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78841", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.7884", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.7881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78818", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4", "reference_id": "GHSA-88pm-hfmq-7vv4", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2022-44640" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70429?format=api", "vulnerability_id": "VCID-ezmy-qjh7-6ycj", "summary": "security update", "references": [ { "reference_url": "http://h5l.org/advisories.html?show=2017-12-08", "reference_id": "", "reference_type": "", "scores": [], "url": "http://h5l.org/advisories.html?show=2017-12-08" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8842", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88419", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8843", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.9267", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.92676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.92663", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887" }, { "reference_url": "https://github.com/heimdal/heimdal/issues/353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/heimdal/heimdal/issues/353" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4055" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439", "reference_id": "CVE-2017-17439", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3" } ], "aliases": [ "CVE-2017-17439" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezmy-qjh7-6ycj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api", "vulnerability_id": "VCID-frnd-3wwy-93ek", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8933", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589", "reference_id": "1778589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786", "reference_id": "946786", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2019-14870" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49836?format=api", "vulnerability_id": "VCID-jhcx-pb5e-8kev", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5733", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5741", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57465", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580", "reference_id": "f9ec7002cdd526ae84fbacbf153162e118f22580", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv", "reference_id": "GHSA-69h9-669w-88xv", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2021-44758" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhcx-pb5e-8kev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74701?format=api", "vulnerability_id": "VCID-r49y-kqyv-pkbq", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86211", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86202", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89334", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89351", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.8937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89383", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89376", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html", "reference_id": "000009.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://seclists.org/bugtraq/2019/Jun/1" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf", "reference_id": "2f7f3d9960aa6ea21358bdf3687cee5149aa35cf", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" }, { "reference_url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72", "reference_id": "3e58559...bbafe72", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064", "reference_id": "929064", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4455", "reference_id": "dsa-4455", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4455" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/", "reference_id": "GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" }, { "reference_url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0", "reference_id": "heimdal-7.6.0", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/", "reference_id": "SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3" } ], "aliases": [ "CVE-2019-12098" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r49y-kqyv-pkbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49841?format=api", "vulnerability_id": "VCID-rfpr-mdg9-3uaa", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25124", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25166", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25346", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25252", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849", "reference_id": "1030849", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672", "reference_id": "2166672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/5849-1/", "reference_id": "USN-5849-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5849-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2022-45142" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfpr-mdg9-3uaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api", "vulnerability_id": "VCID-s2ne-rcp3-nbgz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72621", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774", "reference_id": "2137774", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437", "reference_id": "CVE-2022-3437", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html", "reference_id": "CVE-2022-3437.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2022-3437" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api", "vulnerability_id": "VCID-tcbv-cguk-hfg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90907", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90912", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976", "reference_id": "1469976", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208", "reference_id": "868208", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209", "reference_id": "868209", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209" }, { "reference_url": "https://usn.ubuntu.com/3353-1/", "reference_id": "USN-3353-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-1/" }, { "reference_url": "https://usn.ubuntu.com/3353-2/", "reference_id": "USN-3353-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-2/" }, { "reference_url": "https://usn.ubuntu.com/3353-3/", "reference_id": "USN-3353-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-3/" }, { "reference_url": "https://usn.ubuntu.com/3353-4/", "reference_id": "USN-3353-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036803?format=api", "purl": "pkg:deb/debian/heimdal@1.6~rc2%2Bdfsg-9%2Bdeb8u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-81xv-v927-8fdz" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.6~rc2%252Bdfsg-9%252Bdeb8u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3" } ], "aliases": [ "CVE-2017-11103" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33935?format=api", "vulnerability_id": "VCID-unvx-tsxw-abbw", "summary": "A boundary error in Heimdal could result in execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.9974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99745", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325", "reference_id": "770325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201201-14", "reference_id": "GLSA-201201-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-14" }, { "reference_url": "https://security.gentoo.org/glsa/201202-05", "reference_id": "GLSA-201202-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201202-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1851", "reference_id": "RHSA-2011:1851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1852", "reference_id": "RHSA-2011:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1853", "reference_id": "RHSA-2011:1853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1854", "reference_id": "RHSA-2011:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036801?format=api", "purl": "pkg:deb/debian/heimdal@1.6~git20120403%2Bdfsg1-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-81xv-v927-8fdz" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.6~git20120403%252Bdfsg1-2" } ], "aliases": [ "CVE-2011-4862" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api", "vulnerability_id": "VCID-ws2g-8ye2-pkdk", "summary": "samba: Null pointer dereference on missing sname in TGS-REQ", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86613", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.8661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86607", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080", "reference_id": "2013080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586", "reference_id": "996586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586" }, { "reference_url": "https://security.archlinux.org/AVG-2418", "reference_id": "AVG-2418", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2418" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3" } ], "aliases": [ "CVE-2021-3671" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62434?format=api", "vulnerability_id": "VCID-jfb1-3vg4-vbap", "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n most severe of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2" }, { "reference_url": "http://osvdb.org/64744", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/64744" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83073", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82969", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83027", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.8307", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" }, { "reference_url": "http://secunia.com/advisories/39762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39762" }, { "reference_url": "http://secunia.com/advisories/39784", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39784" }, { "reference_url": "http://secunia.com/advisories/39799", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39799" }, { "reference_url": "http://secunia.com/advisories/39818", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39818" }, { "reference_url": "http://secunia.com/advisories/39849", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39849" }, { "reference_url": "http://secunia.com/advisories/40346", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40346" }, { "reference_url": "http://secunia.com/advisories/40685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40685" }, { "reference_url": "http://secunia.com/advisories/41967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41967" }, { "reference_url": "http://secunia.com/advisories/42432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42432" }, { "reference_url": "http://secunia.com/advisories/42974", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42974" }, { "reference_url": "http://secunia.com/advisories/43335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43335" }, { "reference_url": "http://secunia.com/advisories/44954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44954" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100114315", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100114315" }, { "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2052" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/40235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40235" }, { "reference_url": "http://www.ubuntu.com/usn/USN-940-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-940-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-940-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-940-2" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1177", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1177" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1192" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1193" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1196" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1222", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1222" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1574", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1574" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1882", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1882" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3112" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0134", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261", "reference_id": "582261", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466", "reference_id": "582466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321", "reference_id": "CVE-2010-1321", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321" }, { "reference_url": "https://security.gentoo.org/glsa/201201-13", "reference_id": "GLSA-201201-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0423", "reference_id": "RHSA-2010:0423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0873", "reference_id": "RHSA-2010:0873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0935", "reference_id": "RHSA-2010:0935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0935" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0152", "reference_id": "RHSA-2011:0152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0152" }, { "reference_url": "https://usn.ubuntu.com/940-1/", "reference_id": "USN-940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/940-1/" }, { "reference_url": "https://usn.ubuntu.com/940-2/", "reference_id": "USN-940-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/940-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036800?format=api", "purl": "pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-21hz-xvek-73cd" }, { "vulnerability": "VCID-3du2-evy8-jfa1" }, { "vulnerability": "VCID-5tkj-88u2-83ha" }, { "vulnerability": "VCID-81xv-v927-8fdz" }, { "vulnerability": "VCID-bc1t-hzu5-bffd" }, { "vulnerability": "VCID-ezmy-qjh7-6ycj" }, { "vulnerability": "VCID-frnd-3wwy-93ek" }, { "vulnerability": "VCID-jhcx-pb5e-8kev" }, { "vulnerability": "VCID-r49y-kqyv-pkbq" }, { "vulnerability": "VCID-rfpr-mdg9-3uaa" }, { "vulnerability": "VCID-s2ne-rcp3-nbgz" }, { "vulnerability": "VCID-tcbv-cguk-hfg2" }, { "vulnerability": "VCID-unvx-tsxw-abbw" }, { "vulnerability": "VCID-ws2g-8ye2-pkdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%252Bsqueeze1" } ], "aliases": [ "CVE-2010-1321" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap" } ], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%252Bsqueeze1" }