Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/krb5@1.6.1-31.el5_3?arch=3
Typerpm
Namespaceredhat
Namekrb5
Version1.6.1-31.el5_3
Qualifiers
arch 3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-hryp-mt7d-kygt
vulnerability_id VCID-hryp-mt7d-kygt
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0844
reference_id
reference_type
scores
0
value 0.03433
scoring_system epss
scoring_elements 0.8742
published_at 2026-04-01T12:55:00Z
1
value 0.03433
scoring_system epss
scoring_elements 0.8743
published_at 2026-04-02T12:55:00Z
2
value 0.03433
scoring_system epss
scoring_elements 0.87444
published_at 2026-04-04T12:55:00Z
3
value 0.03433
scoring_system epss
scoring_elements 0.87446
published_at 2026-04-07T12:55:00Z
4
value 0.03433
scoring_system epss
scoring_elements 0.87465
published_at 2026-04-08T12:55:00Z
5
value 0.03433
scoring_system epss
scoring_elements 0.87472
published_at 2026-04-09T12:55:00Z
6
value 0.03433
scoring_system epss
scoring_elements 0.87484
published_at 2026-04-11T12:55:00Z
7
value 0.03433
scoring_system epss
scoring_elements 0.87479
published_at 2026-04-12T12:55:00Z
8
value 0.03433
scoring_system epss
scoring_elements 0.87476
published_at 2026-04-13T12:55:00Z
9
value 0.03433
scoring_system epss
scoring_elements 0.8749
published_at 2026-04-21T12:55:00Z
10
value 0.03433
scoring_system epss
scoring_elements 0.87492
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491033
reference_id 491033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491033
4
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
5
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
6
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
aliases CVE-2009-0844
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hryp-mt7d-kygt
1
url VCID-qq4w-brbc-8fab
vulnerability_id VCID-qq4w-brbc-8fab
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0846
reference_id
reference_type
scores
0
value 0.50005
scoring_system epss
scoring_elements 0.9783
published_at 2026-04-21T12:55:00Z
1
value 0.50005
scoring_system epss
scoring_elements 0.97819
published_at 2026-04-11T12:55:00Z
2
value 0.50005
scoring_system epss
scoring_elements 0.97821
published_at 2026-04-12T12:55:00Z
3
value 0.50005
scoring_system epss
scoring_elements 0.97823
published_at 2026-04-13T12:55:00Z
4
value 0.50005
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-16T12:55:00Z
5
value 0.50005
scoring_system epss
scoring_elements 0.97832
published_at 2026-04-18T12:55:00Z
6
value 0.50005
scoring_system epss
scoring_elements 0.97817
published_at 2026-04-09T12:55:00Z
7
value 0.56355
scoring_system epss
scoring_elements 0.98101
published_at 2026-04-02T12:55:00Z
8
value 0.56355
scoring_system epss
scoring_elements 0.98104
published_at 2026-04-04T12:55:00Z
9
value 0.56355
scoring_system epss
scoring_elements 0.98105
published_at 2026-04-07T12:55:00Z
10
value 0.56355
scoring_system epss
scoring_elements 0.98109
published_at 2026-04-08T12:55:00Z
11
value 0.56355
scoring_system epss
scoring_elements 0.98097
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491036
reference_id 491036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491036
4
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
5
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
6
reference_url https://access.redhat.com/errata/RHSA-2009:0409
reference_id RHSA-2009:0409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0409
7
reference_url https://access.redhat.com/errata/RHSA-2009:0410
reference_id RHSA-2009:0410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0410
8
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
aliases CVE-2009-0846
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qq4w-brbc-8fab
2
url VCID-v61z-w8nz-87bv
vulnerability_id VCID-v61z-w8nz-87bv
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0845
reference_id
reference_type
scores
0
value 0.19309
scoring_system epss
scoring_elements 0.95384
published_at 2026-04-21T12:55:00Z
1
value 0.19309
scoring_system epss
scoring_elements 0.95333
published_at 2026-04-01T12:55:00Z
2
value 0.19309
scoring_system epss
scoring_elements 0.95343
published_at 2026-04-02T12:55:00Z
3
value 0.19309
scoring_system epss
scoring_elements 0.95349
published_at 2026-04-04T12:55:00Z
4
value 0.19309
scoring_system epss
scoring_elements 0.95354
published_at 2026-04-07T12:55:00Z
5
value 0.19309
scoring_system epss
scoring_elements 0.95361
published_at 2026-04-08T12:55:00Z
6
value 0.19309
scoring_system epss
scoring_elements 0.95364
published_at 2026-04-09T12:55:00Z
7
value 0.19309
scoring_system epss
scoring_elements 0.95368
published_at 2026-04-12T12:55:00Z
8
value 0.19309
scoring_system epss
scoring_elements 0.9537
published_at 2026-04-13T12:55:00Z
9
value 0.19309
scoring_system epss
scoring_elements 0.95377
published_at 2026-04-16T12:55:00Z
10
value 0.19309
scoring_system epss
scoring_elements 0.95381
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0845
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
5
reference_url http://secunia.com/advisories/34347
reference_id
reference_type
scores
url http://secunia.com/advisories/34347
6
reference_url http://secunia.com/advisories/34594
reference_id
reference_type
scores
url http://secunia.com/advisories/34594
7
reference_url http://secunia.com/advisories/34617
reference_id
reference_type
scores
url http://secunia.com/advisories/34617
8
reference_url http://secunia.com/advisories/34622
reference_id
reference_type
scores
url http://secunia.com/advisories/34622
9
reference_url http://secunia.com/advisories/34628
reference_id
reference_type
scores
url http://secunia.com/advisories/34628
10
reference_url http://secunia.com/advisories/34630
reference_id
reference_type
scores
url http://secunia.com/advisories/34630
11
reference_url http://secunia.com/advisories/34637
reference_id
reference_type
scores
url http://secunia.com/advisories/34637
12
reference_url http://secunia.com/advisories/34640
reference_id
reference_type
scores
url http://secunia.com/advisories/34640
13
reference_url http://secunia.com/advisories/34734
reference_id
reference_type
scores
url http://secunia.com/advisories/34734
14
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
15
reference_url http://security.gentoo.org/glsa/glsa-200904-09.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200904-09.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49448
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49448
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449
19
reference_url http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084
reference_id
reference_type
scores
url http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084
20
reference_url http://src.mit.edu/fisheye/changelog/krb5/?cs=22084
reference_id
reference_type
scores
url http://src.mit.edu/fisheye/changelog/krb5/?cs=22084
21
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
22
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
23
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm
24
reference_url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
reference_id
reference_type
scores
url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
25
reference_url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
reference_id
reference_type
scores
url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
26
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
27
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
28
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt
29
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0058
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0058
30
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
31
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21396120
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21396120
32
reference_url http://www.kb.cert.org/vuls/id/662091
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/662091
33
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:082
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:082
34
reference_url http://www.redhat.com/support/errata/RHSA-2009-0408.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0408.html
35
reference_url http://www.securityfocus.com/archive/1/502526/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502526/100/0/threaded
36
reference_url http://www.securityfocus.com/archive/1/502546/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502546/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/34257
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34257
38
reference_url http://www.securitytracker.com/id?1021867
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021867
39
reference_url http://www.ubuntu.com/usn/usn-755-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-755-1
40
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
41
reference_url http://www.vupen.com/english/advisories/2009/0847
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0847
42
reference_url http://www.vupen.com/english/advisories/2009/0976
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0976
43
reference_url http://www.vupen.com/english/advisories/2009/1057
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1057
44
reference_url http://www.vupen.com/english/advisories/2009/1106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1106
45
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
46
reference_url http://www.vupen.com/english/advisories/2009/2248
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/2248
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490634
reference_id 490634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490634
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0845
reference_id CVE-2009-0845
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0845
57
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
58
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
59
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
aliases CVE-2009-0845
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v61z-w8nz-87bv
Fixing_vulnerabilities
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.6.1-31.el5_3%3Farch=3