Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/krb5@1.8.2-3.el6_0?arch=3
Typerpm
Namespaceredhat
Namekrb5
Version1.8.2-3.el6_0
Qualifiers
arch 3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-mjvu-45rb-6kf8
vulnerability_id VCID-mjvu-45rb-6kf8
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
8
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
9
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
10
reference_url http://marc.info/?l=bugtraq&m=130497213107107&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130497213107107&w=2
11
reference_url http://osvdb.org/69610
reference_id
reference_type
scores
url http://osvdb.org/69610
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
reference_id
reference_type
scores
0
value 0.04735
scoring_system epss
scoring_elements 0.89421
published_at 2026-04-18T12:55:00Z
1
value 0.04735
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-21T12:55:00Z
2
value 0.04735
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-01T12:55:00Z
3
value 0.04735
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-02T12:55:00Z
4
value 0.04735
scoring_system epss
scoring_elements 0.89381
published_at 2026-04-04T12:55:00Z
5
value 0.04735
scoring_system epss
scoring_elements 0.89383
published_at 2026-04-07T12:55:00Z
6
value 0.04735
scoring_system epss
scoring_elements 0.894
published_at 2026-04-08T12:55:00Z
7
value 0.04735
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-09T12:55:00Z
8
value 0.04735
scoring_system epss
scoring_elements 0.89411
published_at 2026-04-11T12:55:00Z
9
value 0.04735
scoring_system epss
scoring_elements 0.89409
published_at 2026-04-12T12:55:00Z
10
value 0.04735
scoring_system epss
scoring_elements 0.89404
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
15
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
16
reference_url http://secunia.com/advisories/42420
reference_id
reference_type
scores
url http://secunia.com/advisories/42420
17
reference_url http://secunia.com/advisories/42436
reference_id
reference_type
scores
url http://secunia.com/advisories/42436
18
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
21
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
22
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
23
reference_url http://www.debian.org/security/2010/dsa-2129
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2129
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
26
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2010-0926.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0926.html
29
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
31
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/45118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45118
33
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
34
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
35
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
36
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
37
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
38
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
39
reference_url http://www.vupen.com/english/advisories/2010/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3101
40
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
41
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648734
reference_id 648734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648734
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
reference_id CVE-2010-1323
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
72
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
73
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
74
reference_url https://access.redhat.com/errata/RHSA-2010:0926
reference_id RHSA-2010:0926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0926
75
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
aliases CVE-2010-1323
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjvu-45rb-6kf8
1
url VCID-p65d-bnug-c7fr
vulnerability_id VCID-p65d-bnug-c7fr
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://osvdb.org/69608
reference_id
reference_type
scores
url http://osvdb.org/69608
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
reference_id
reference_type
scores
0
value 0.00535
scoring_system epss
scoring_elements 0.67467
published_at 2026-04-21T12:55:00Z
1
value 0.00535
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-18T12:55:00Z
2
value 0.00535
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-01T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67398
published_at 2026-04-07T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.6742
published_at 2026-04-04T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.6745
published_at 2026-04-08T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.67464
published_at 2026-04-09T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.67486
published_at 2026-04-11T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67473
published_at 2026-04-12T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.6744
published_at 2026-04-13T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.67476
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
11
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
12
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
13
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
17
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/45117
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45117
20
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
21
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
22
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
23
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
24
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
25
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648735
reference_id 648735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648735
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
reference_id CVE-2010-4020
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
35
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
aliases CVE-2010-4020
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p65d-bnug-c7fr
2
url VCID-qdte-3pqp-17at
vulnerability_id VCID-qdte-3pqp-17at
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
8
reference_url http://osvdb.org/69609
reference_id
reference_type
scores
url http://osvdb.org/69609
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
reference_id
reference_type
scores
0
value 0.03499
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-21T12:55:00Z
1
value 0.03499
scoring_system epss
scoring_elements 0.87618
published_at 2026-04-18T12:55:00Z
2
value 0.03499
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-01T12:55:00Z
3
value 0.03499
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-02T12:55:00Z
4
value 0.03499
scoring_system epss
scoring_elements 0.87571
published_at 2026-04-04T12:55:00Z
5
value 0.03499
scoring_system epss
scoring_elements 0.87574
published_at 2026-04-07T12:55:00Z
6
value 0.03499
scoring_system epss
scoring_elements 0.87593
published_at 2026-04-08T12:55:00Z
7
value 0.03499
scoring_system epss
scoring_elements 0.87599
published_at 2026-04-09T12:55:00Z
8
value 0.03499
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-11T12:55:00Z
9
value 0.03499
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-12T12:55:00Z
10
value 0.03499
scoring_system epss
scoring_elements 0.87603
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
12
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
13
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
15
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
16
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
18
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
20
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
21
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/45116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45116
23
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
24
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
26
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
27
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
28
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
29
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648674
reference_id 648674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648674
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
reference_id CVE-2010-1324
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
39
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
40
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
41
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
aliases CVE-2010-1324
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdte-3pqp-17at
Fixing_vulnerabilities
Risk_score2.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.8.2-3.el6_0%3Farch=3