Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
Typedeb
Namespacedebian
Namekrb5
Version1.6.dfsg.4~beta1-5lenny7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.20.1-2+deb12u4
Latest_non_vulnerable_version1.20.1-2+deb12u4
Affected_by_vulnerabilities
0
url VCID-2r88-c5e9-vffv
vulnerability_id VCID-2r88-c5e9-vffv
summary krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5729
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22798
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-21T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22869
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22862
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22967
published_at 2026-04-02T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.23011
published_at 2026-04-04T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-07T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22877
published_at 2026-04-08T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22929
published_at 2026-04-09T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22948
published_at 2026-04-11T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22911
published_at 2026-04-12T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22854
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5729
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551083
reference_id 1551083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551083
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
reference_id 891869
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
6
reference_url https://security.archlinux.org/ASA-201806-3
reference_id ASA-201806-3
reference_type
scores
url https://security.archlinux.org/ASA-201806-3
7
reference_url https://security.archlinux.org/AVG-586
reference_id AVG-586
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-586
8
reference_url https://access.redhat.com/errata/RHSA-2018:3071
reference_id RHSA-2018:3071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3071
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5729
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r88-c5e9-vffv
1
url VCID-3362-hawt-17ek
vulnerability_id VCID-3362-hawt-17ek
summary krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3576
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46024
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46041
published_at 2026-04-12T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46049
published_at 2026-04-13T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46104
published_at 2026-04-16T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.461
published_at 2026-04-18T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46045
published_at 2026-04-21T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46044
published_at 2026-04-04T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.45992
published_at 2026-04-07T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46048
published_at 2026-04-08T12:55:00Z
9
value 0.00232
scoring_system epss
scoring_elements 0.46046
published_at 2026-04-09T12:55:00Z
10
value 0.00232
scoring_system epss
scoring_elements 0.46069
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3576
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525
reference_id 1103525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359465
reference_id 2359465
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359465
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-3576
reference_id CVE-2025-3576
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/security/cve/CVE-2025-3576
29
reference_url https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
reference_id krb5-1.22.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
30
reference_url https://access.redhat.com/errata/RHSA-2025:11487
reference_id RHSA-2025:11487
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:11487
31
reference_url https://access.redhat.com/errata/RHSA-2025:13664
reference_id RHSA-2025:13664
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:13664
32
reference_url https://access.redhat.com/errata/RHSA-2025:13777
reference_id RHSA-2025:13777
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:13777
33
reference_url https://access.redhat.com/errata/RHSA-2025:15000
reference_id RHSA-2025:15000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15000
34
reference_url https://access.redhat.com/errata/RHSA-2025:15001
reference_id RHSA-2025:15001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15001
35
reference_url https://access.redhat.com/errata/RHSA-2025:15002
reference_id RHSA-2025:15002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15002
36
reference_url https://access.redhat.com/errata/RHSA-2025:15003
reference_id RHSA-2025:15003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15003
37
reference_url https://access.redhat.com/errata/RHSA-2025:15004
reference_id RHSA-2025:15004
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15004
38
reference_url https://access.redhat.com/errata/RHSA-2025:8411
reference_id RHSA-2025:8411
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:8411
39
reference_url https://access.redhat.com/errata/RHSA-2025:9418
reference_id RHSA-2025:9418
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:9418
40
reference_url https://access.redhat.com/errata/RHSA-2025:9430
reference_id RHSA-2025:9430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:9430
41
reference_url https://usn.ubuntu.com/7542-1/
reference_id USN-7542-1
reference_type
scores
url https://usn.ubuntu.com/7542-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4
aliases CVE-2025-3576
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3362-hawt-17ek
2
url VCID-3du2-evy8-jfa1
vulnerability_id VCID-3du2-evy8-jfa1
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
reference_id
reference_type
scores
0
value 0.08257
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-21T12:55:00Z
1
value 0.08889
scoring_system epss
scoring_elements 0.9254
published_at 2026-04-04T12:55:00Z
2
value 0.08889
scoring_system epss
scoring_elements 0.92532
published_at 2026-04-02T12:55:00Z
3
value 0.08889
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-18T12:55:00Z
4
value 0.08889
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-12T12:55:00Z
5
value 0.08889
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-13T12:55:00Z
6
value 0.08889
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-09T12:55:00Z
7
value 0.08889
scoring_system epss
scoring_elements 0.92553
published_at 2026-04-08T12:55:00Z
8
value 0.08889
scoring_system epss
scoring_elements 0.92542
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
reference_id 1024267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
reference_id 2140960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
12
reference_url https://web.mit.edu/kerberos/advisories/
reference_id advisories
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/advisories/
13
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
14
reference_url https://www.samba.org/samba/security/CVE-2022-42898.html
reference_id CVE-2022-42898.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://www.samba.org/samba/security/CVE-2022-42898.html
15
reference_url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_id ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
16
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
reference_id GHSA-64mq-fvfj-5x3c
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
17
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202309-06
18
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202310-06
19
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
20
reference_url https://web.mit.edu/kerberos/krb5-1.19/
reference_id krb5-1.19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.19/
21
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
22
reference_url https://security.netapp.com/advisory/ntap-20230223-0001/
reference_id ntap-20230223-0001
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230223-0001/
23
reference_url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
reference_id README-1.20.1.txt
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
24
reference_url https://access.redhat.com/errata/RHSA-2022:8637
reference_id RHSA-2022:8637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8637
25
reference_url https://access.redhat.com/errata/RHSA-2022:8638
reference_id RHSA-2022:8638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8638
26
reference_url https://access.redhat.com/errata/RHSA-2022:8639
reference_id RHSA-2022:8639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8639
27
reference_url https://access.redhat.com/errata/RHSA-2022:8640
reference_id RHSA-2022:8640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8640
28
reference_url https://access.redhat.com/errata/RHSA-2022:8641
reference_id RHSA-2022:8641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8641
29
reference_url https://access.redhat.com/errata/RHSA-2022:8648
reference_id RHSA-2022:8648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8648
30
reference_url https://access.redhat.com/errata/RHSA-2022:8662
reference_id RHSA-2022:8662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8662
31
reference_url https://access.redhat.com/errata/RHSA-2022:8663
reference_id RHSA-2022:8663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8663
32
reference_url https://access.redhat.com/errata/RHSA-2022:8669
reference_id RHSA-2022:8669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8669
33
reference_url https://access.redhat.com/errata/RHSA-2022:9029
reference_id RHSA-2022:9029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9029
34
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15203
reference_id show_bug.cgi?id=15203
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15203
35
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
36
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
37
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
38
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
39
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2022-42898
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1
3
url VCID-3e2p-t5d5-33hd
vulnerability_id VCID-3e2p-t5d5-33hd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4212
reference_id
reference_type
scores
0
value 0.16485
scoring_system epss
scoring_elements 0.94864
published_at 2026-04-01T12:55:00Z
1
value 0.16485
scoring_system epss
scoring_elements 0.94874
published_at 2026-04-02T12:55:00Z
2
value 0.16485
scoring_system epss
scoring_elements 0.94877
published_at 2026-04-04T12:55:00Z
3
value 0.16485
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-07T12:55:00Z
4
value 0.16485
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-08T12:55:00Z
5
value 0.16485
scoring_system epss
scoring_elements 0.94892
published_at 2026-04-09T12:55:00Z
6
value 0.16485
scoring_system epss
scoring_elements 0.94897
published_at 2026-04-11T12:55:00Z
7
value 0.16485
scoring_system epss
scoring_elements 0.94899
published_at 2026-04-12T12:55:00Z
8
value 0.16485
scoring_system epss
scoring_elements 0.94901
published_at 2026-04-13T12:55:00Z
9
value 0.16485
scoring_system epss
scoring_elements 0.94908
published_at 2026-04-16T12:55:00Z
10
value 0.16485
scoring_system epss
scoring_elements 0.94911
published_at 2026-04-18T12:55:00Z
11
value 0.16485
scoring_system epss
scoring_elements 0.94915
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=545015
reference_id 545015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=545015
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2010:0029
reference_id RHSA-2010:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0029
6
reference_url https://usn.ubuntu.com/881-1/
reference_id USN-881-1
reference_type
scores
url https://usn.ubuntu.com/881-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-4212
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3e2p-t5d5-33hd
4
url VCID-4e9j-8vtc-tbda
vulnerability_id VCID-4e9j-8vtc-tbda
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0477.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0477.html
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5351
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57387
published_at 2026-04-21T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57276
published_at 2026-04-01T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57358
published_at 2026-04-02T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57381
published_at 2026-04-04T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57357
published_at 2026-04-07T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-08T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57411
published_at 2026-04-09T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57426
published_at 2026-04-11T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57404
published_at 2026-04-12T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57386
published_at 2026-04-13T12:55:00Z
10
value 0.00348
scoring_system epss
scoring_elements 0.57412
published_at 2026-04-16T12:55:00Z
11
value 0.00348
scoring_system epss
scoring_elements 0.57409
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5351
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
9
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
11
reference_url https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
12
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
14
reference_url http://www.securityfocus.com/bid/70380
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70380
15
reference_url http://www.securitytracker.com/id/1031003
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031003
16
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145425
reference_id 1145425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145425
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479
reference_id 762479
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5351
reference_id CVE-2014-5351
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5351
21
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
22
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5351
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4e9j-8vtc-tbda
5
url VCID-4xpe-hb37-5qdm
vulnerability_id VCID-4xpe-hb37-5qdm
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1014
reference_id
reference_type
scores
0
value 0.04152
scoring_system epss
scoring_elements 0.8868
published_at 2026-04-21T12:55:00Z
1
value 0.04152
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-01T12:55:00Z
2
value 0.04152
scoring_system epss
scoring_elements 0.88626
published_at 2026-04-02T12:55:00Z
3
value 0.04152
scoring_system epss
scoring_elements 0.88642
published_at 2026-04-04T12:55:00Z
4
value 0.04152
scoring_system epss
scoring_elements 0.88644
published_at 2026-04-07T12:55:00Z
5
value 0.04152
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-08T12:55:00Z
6
value 0.04152
scoring_system epss
scoring_elements 0.88666
published_at 2026-04-09T12:55:00Z
7
value 0.04152
scoring_system epss
scoring_elements 0.88679
published_at 2026-04-11T12:55:00Z
8
value 0.04152
scoring_system epss
scoring_elements 0.88672
published_at 2026-04-13T12:55:00Z
9
value 0.04152
scoring_system epss
scoring_elements 0.88685
published_at 2026-04-16T12:55:00Z
10
value 0.04152
scoring_system epss
scoring_elements 0.88682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1014
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
reference_id 683429
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=838014
reference_id 838014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=838014
6
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
7
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1014
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xpe-hb37-5qdm
6
url VCID-51sv-1nva-eqey
vulnerability_id VCID-51sv-1nva-eqey
summary krb5: NULL pointer dereference when using a ticket policy name as a password policy name
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0536.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0536.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0794.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0794.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5353
reference_id
reference_type
scores
0
value 0.00652
scoring_system epss
scoring_elements 0.70902
published_at 2026-04-21T12:55:00Z
1
value 0.00652
scoring_system epss
scoring_elements 0.70811
published_at 2026-04-01T12:55:00Z
2
value 0.00652
scoring_system epss
scoring_elements 0.70825
published_at 2026-04-02T12:55:00Z
3
value 0.00652
scoring_system epss
scoring_elements 0.70843
published_at 2026-04-04T12:55:00Z
4
value 0.00652
scoring_system epss
scoring_elements 0.70818
published_at 2026-04-07T12:55:00Z
5
value 0.00652
scoring_system epss
scoring_elements 0.70862
published_at 2026-04-08T12:55:00Z
6
value 0.00652
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-09T12:55:00Z
7
value 0.00652
scoring_system epss
scoring_elements 0.70901
published_at 2026-04-11T12:55:00Z
8
value 0.00652
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-12T12:55:00Z
9
value 0.00652
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-13T12:55:00Z
10
value 0.00652
scoring_system epss
scoring_elements 0.70916
published_at 2026-04-16T12:55:00Z
11
value 0.00652
scoring_system epss
scoring_elements 0.70922
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5353
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
9
reference_url https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
10
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:009
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:009
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
13
reference_url http://www.securityfocus.com/bid/71679
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71679
14
reference_url http://www.securitytracker.com/id/1031376
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031376
15
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174543
reference_id 1174543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174543
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5353
reference_id CVE-2014-5353
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5353
48
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
49
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
50
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5353
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51sv-1nva-eqey
7
url VCID-5np7-5bb3-wbfx
vulnerability_id VCID-5np7-5bb3-wbfx
summary krb5: unauthenticated denial of service in recvauth_common() and others
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5355
reference_id
reference_type
scores
0
value 0.09423
scoring_system epss
scoring_elements 0.92811
published_at 2026-04-21T12:55:00Z
1
value 0.09423
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-01T12:55:00Z
2
value 0.09423
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-02T12:55:00Z
3
value 0.09423
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-04T12:55:00Z
4
value 0.09423
scoring_system epss
scoring_elements 0.92778
published_at 2026-04-07T12:55:00Z
5
value 0.09423
scoring_system epss
scoring_elements 0.92787
published_at 2026-04-08T12:55:00Z
6
value 0.09423
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-09T12:55:00Z
7
value 0.09423
scoring_system epss
scoring_elements 0.92796
published_at 2026-04-11T12:55:00Z
8
value 0.09423
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-13T12:55:00Z
9
value 0.09423
scoring_system epss
scoring_elements 0.92806
published_at 2026-04-16T12:55:00Z
10
value 0.09423
scoring_system epss
scoring_elements 0.92807
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5355
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1193939
reference_id 1193939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1193939
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647
reference_id 778647
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647
6
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
7
reference_url https://access.redhat.com/errata/RHSA-2015:2154
reference_id RHSA-2015:2154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2154
8
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5355
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5np7-5bb3-wbfx
8
url VCID-5s5f-d1ue-gfda
vulnerability_id VCID-5s5f-d1ue-gfda
summary krb5: PKINIT null pointer deref leads to DoS
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1016
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.70652
published_at 2026-04-21T12:55:00Z
1
value 0.00643
scoring_system epss
scoring_elements 0.70556
published_at 2026-04-01T12:55:00Z
2
value 0.00643
scoring_system epss
scoring_elements 0.7057
published_at 2026-04-02T12:55:00Z
3
value 0.00643
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-04T12:55:00Z
4
value 0.00643
scoring_system epss
scoring_elements 0.70565
published_at 2026-04-07T12:55:00Z
5
value 0.00643
scoring_system epss
scoring_elements 0.70611
published_at 2026-04-08T12:55:00Z
6
value 0.00643
scoring_system epss
scoring_elements 0.70626
published_at 2026-04-09T12:55:00Z
7
value 0.00643
scoring_system epss
scoring_elements 0.70649
published_at 2026-04-11T12:55:00Z
8
value 0.00643
scoring_system epss
scoring_elements 0.70634
published_at 2026-04-12T12:55:00Z
9
value 0.00643
scoring_system epss
scoring_elements 0.7062
published_at 2026-04-13T12:55:00Z
10
value 0.00643
scoring_system epss
scoring_elements 0.70665
published_at 2026-04-16T12:55:00Z
11
value 0.00643
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016
4
reference_url http://secunia.com/advisories/55040
reference_id
reference_type
scores
url http://secunia.com/advisories/55040
5
reference_url https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c
6
reference_url http://web.mit.edu/kerberos/www/krb5-1.10/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.10/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633
reference_id 702633
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917840
reference_id 917840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917840
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1016
reference_id CVE-2012-1016
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-1016
11
reference_url https://access.redhat.com/errata/RHSA-2013:0656
reference_id RHSA-2013:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0656
12
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1016
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5s5f-d1ue-gfda
9
url VCID-5txn-a4x1-nbbe
vulnerability_id VCID-5txn-a4x1-nbbe
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
reference_id
reference_type
scores
url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
reference_id
reference_type
scores
0
value 0.10754
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-21T12:55:00Z
1
value 0.10754
scoring_system epss
scoring_elements 0.93307
published_at 2026-04-01T12:55:00Z
2
value 0.10754
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-02T12:55:00Z
3
value 0.10754
scoring_system epss
scoring_elements 0.93321
published_at 2026-04-04T12:55:00Z
4
value 0.10754
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-07T12:55:00Z
5
value 0.10754
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-08T12:55:00Z
6
value 0.10754
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-09T12:55:00Z
7
value 0.10754
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-13T12:55:00Z
8
value 0.10754
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-12T12:55:00Z
9
value 0.10754
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-16T12:55:00Z
10
value 0.10754
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
5
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
6
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
7
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
16
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/46265
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46265
19
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
20
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
21
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
22
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
23
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
24
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668719
reference_id 668719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668719
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
reference_id CVE-2011-0281
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
38
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
39
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
40
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
41
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0281
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5txn-a4x1-nbbe
10
url VCID-5z7g-r4bh-2qb1
vulnerability_id VCID-5z7g-r4bh-2qb1
summary krb5: kadmind denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1013
reference_id
reference_type
scores
0
value 0.01042
scoring_system epss
scoring_elements 0.77392
published_at 2026-04-01T12:55:00Z
1
value 0.01042
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-02T12:55:00Z
2
value 0.01042
scoring_system epss
scoring_elements 0.77425
published_at 2026-04-04T12:55:00Z
3
value 0.01042
scoring_system epss
scoring_elements 0.77405
published_at 2026-04-07T12:55:00Z
4
value 0.01042
scoring_system epss
scoring_elements 0.77435
published_at 2026-04-08T12:55:00Z
5
value 0.01042
scoring_system epss
scoring_elements 0.77445
published_at 2026-04-09T12:55:00Z
6
value 0.01042
scoring_system epss
scoring_elements 0.77471
published_at 2026-04-11T12:55:00Z
7
value 0.01042
scoring_system epss
scoring_elements 0.77451
published_at 2026-04-12T12:55:00Z
8
value 0.01042
scoring_system epss
scoring_elements 0.77447
published_at 2026-04-13T12:55:00Z
9
value 0.01042
scoring_system epss
scoring_elements 0.77487
published_at 2026-04-16T12:55:00Z
10
value 0.01042
scoring_system epss
scoring_elements 0.77485
published_at 2026-04-18T12:55:00Z
11
value 0.01042
scoring_system epss
scoring_elements 0.77478
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647
reference_id 687647
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827517
reference_id 827517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827517
5
reference_url https://access.redhat.com/errata/RHSA-2012:1131
reference_id RHSA-2012:1131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1131
6
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1013
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z7g-r4bh-2qb1
11
url VCID-5zx4-257n-ckhq
vulnerability_id VCID-5zx4-257n-ckhq
summary security flaw
references
0
reference_url http://idefense.com/application/poi/display?id=260&type=vulnerabilities
reference_id
reference_type
scores
url http://idefense.com/application/poi/display?id=260&type=vulnerabilities
1
reference_url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0488.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0488.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0488
reference_id
reference_type
scores
0
value 0.10248
scoring_system epss
scoring_elements 0.93182
published_at 2026-04-21T12:55:00Z
1
value 0.10248
scoring_system epss
scoring_elements 0.93123
published_at 2026-04-01T12:55:00Z
2
value 0.10248
scoring_system epss
scoring_elements 0.93133
published_at 2026-04-02T12:55:00Z
3
value 0.10248
scoring_system epss
scoring_elements 0.93137
published_at 2026-04-04T12:55:00Z
4
value 0.10248
scoring_system epss
scoring_elements 0.93136
published_at 2026-04-07T12:55:00Z
5
value 0.10248
scoring_system epss
scoring_elements 0.93144
published_at 2026-04-08T12:55:00Z
6
value 0.10248
scoring_system epss
scoring_elements 0.93149
published_at 2026-04-09T12:55:00Z
7
value 0.10248
scoring_system epss
scoring_elements 0.93154
published_at 2026-04-11T12:55:00Z
8
value 0.10248
scoring_system epss
scoring_elements 0.93151
published_at 2026-04-12T12:55:00Z
9
value 0.10248
scoring_system epss
scoring_elements 0.93153
published_at 2026-04-13T12:55:00Z
10
value 0.10248
scoring_system epss
scoring_elements 0.93169
published_at 2026-04-16T12:55:00Z
11
value 0.10248
scoring_system epss
scoring_elements 0.93173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0488
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488
5
reference_url http://secunia.com/advisories/17135
reference_id
reference_type
scores
url http://secunia.com/advisories/17135
6
reference_url http://secunia.com/advisories/21253
reference_id
reference_type
scores
url http://secunia.com/advisories/21253
7
reference_url http://securitytracker.com/id?1014203
reference_id
reference_type
scores
url http://securitytracker.com/id?1014203
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
14
reference_url http://www.kb.cert.org/vuls/id/800829
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/800829
15
reference_url http://www.novell.com/linux/security/advisories/2005_16_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_16_sr.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-504.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-504.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2005-562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-562.html
18
reference_url http://www.securityfocus.com/bid/13940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13940
19
reference_url http://www.securityfocus.com/bid/19289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/19289
20
reference_url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
21
reference_url http://www.vupen.com/english/advisories/2006/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3101
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617531
reference_id 1617531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617531
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0488
reference_id CVE-2005-0488
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-0488
27
reference_url https://access.redhat.com/errata/RHSA-2005:504
reference_id RHSA-2005:504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:504
28
reference_url https://access.redhat.com/errata/RHSA-2005:562
reference_id RHSA-2005:562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:562
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2005-0488
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zx4-257n-ckhq
12
url VCID-6fgr-qbwj-bqf5
vulnerability_id VCID-6fgr-qbwj-bqf5
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
reference_id
reference_type
scores
0
value 0.02618
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-01T12:55:00Z
1
value 0.02618
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-02T12:55:00Z
2
value 0.02618
scoring_system epss
scoring_elements 0.85611
published_at 2026-04-04T12:55:00Z
3
value 0.02618
scoring_system epss
scoring_elements 0.85617
published_at 2026-04-07T12:55:00Z
4
value 0.02618
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-08T12:55:00Z
5
value 0.02618
scoring_system epss
scoring_elements 0.85648
published_at 2026-04-09T12:55:00Z
6
value 0.02618
scoring_system epss
scoring_elements 0.85663
published_at 2026-04-11T12:55:00Z
7
value 0.02618
scoring_system epss
scoring_elements 0.85659
published_at 2026-04-12T12:55:00Z
8
value 0.02618
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-13T12:55:00Z
9
value 0.02618
scoring_system epss
scoring_elements 0.85678
published_at 2026-04-16T12:55:00Z
10
value 0.02618
scoring_system epss
scoring_elements 0.85683
published_at 2026-04-18T12:55:00Z
11
value 0.02618
scoring_system epss
scoring_elements 0.85679
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1527
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fgr-qbwj-bqf5
13
url VCID-6het-dg8q-7fcj
vulnerability_id VCID-6het-dg8q-7fcj
summary krb5: flaw in access control handling for strings in kadmin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1012
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46839
published_at 2026-04-01T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46878
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46895
published_at 2026-04-09T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46842
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46896
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46918
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46891
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46898
published_at 2026-04-13T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46954
published_at 2026-04-16T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.4695
published_at 2026-04-18T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46899
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918
reference_id 670918
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=796438
reference_id 796438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=796438
5
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1012
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6het-dg8q-7fcj
14
url VCID-7b71-uhtv-ubcc
vulnerability_id VCID-7b71-uhtv-ubcc
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1322
reference_id
reference_type
scores
0
value 0.01463
scoring_system epss
scoring_elements 0.8091
published_at 2026-04-21T12:55:00Z
1
value 0.01463
scoring_system epss
scoring_elements 0.80814
published_at 2026-04-01T12:55:00Z
2
value 0.01463
scoring_system epss
scoring_elements 0.80822
published_at 2026-04-02T12:55:00Z
3
value 0.01463
scoring_system epss
scoring_elements 0.80843
published_at 2026-04-04T12:55:00Z
4
value 0.01463
scoring_system epss
scoring_elements 0.80839
published_at 2026-04-07T12:55:00Z
5
value 0.01463
scoring_system epss
scoring_elements 0.80867
published_at 2026-04-08T12:55:00Z
6
value 0.01463
scoring_system epss
scoring_elements 0.80876
published_at 2026-04-09T12:55:00Z
7
value 0.01463
scoring_system epss
scoring_elements 0.80892
published_at 2026-04-11T12:55:00Z
8
value 0.01463
scoring_system epss
scoring_elements 0.80878
published_at 2026-04-12T12:55:00Z
9
value 0.01463
scoring_system epss
scoring_elements 0.8087
published_at 2026-04-13T12:55:00Z
10
value 0.01463
scoring_system epss
scoring_elements 0.80906
published_at 2026-04-16T12:55:00Z
11
value 0.01463
scoring_system epss
scoring_elements 0.80909
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1322
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322
4
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:202
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:202
6
reference_url http://www.redhat.com/support/errata/RHSA-2010-0863.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0863.html
7
reference_url http://www.securityfocus.com/archive/1/514144/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514144/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/43756
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43756
9
reference_url http://www.ubuntu.com/usn/USN-999-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-999-1
10
reference_url http://www.vupen.com/english/advisories/2010/2865
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2865
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237
reference_id 599237
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=636335
reference_id 636335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=636335
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1322
reference_id CVE-2010-1322
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1322
18
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
19
reference_url https://access.redhat.com/errata/RHSA-2010:0863
reference_id RHSA-2010:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0863
20
reference_url https://usn.ubuntu.com/999-1/
reference_id USN-999-1
reference_type
scores
url https://usn.ubuntu.com/999-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-1322
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7b71-uhtv-ubcc
15
url VCID-81qw-myh7-pbdj
vulnerability_id VCID-81qw-myh7-pbdj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5352
reference_id
reference_type
scores
0
value 0.05407
scoring_system epss
scoring_elements 0.90152
published_at 2026-04-21T12:55:00Z
1
value 0.05407
scoring_system epss
scoring_elements 0.90096
published_at 2026-04-01T12:55:00Z
2
value 0.05407
scoring_system epss
scoring_elements 0.90098
published_at 2026-04-02T12:55:00Z
3
value 0.05407
scoring_system epss
scoring_elements 0.9011
published_at 2026-04-04T12:55:00Z
4
value 0.05407
scoring_system epss
scoring_elements 0.90114
published_at 2026-04-07T12:55:00Z
5
value 0.05407
scoring_system epss
scoring_elements 0.9013
published_at 2026-04-08T12:55:00Z
6
value 0.05407
scoring_system epss
scoring_elements 0.90136
published_at 2026-04-09T12:55:00Z
7
value 0.05407
scoring_system epss
scoring_elements 0.90145
published_at 2026-04-11T12:55:00Z
8
value 0.05407
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-12T12:55:00Z
9
value 0.05407
scoring_system epss
scoring_elements 0.90139
published_at 2026-04-13T12:55:00Z
10
value 0.05407
scoring_system epss
scoring_elements 0.90156
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179856
reference_id 1179856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179856
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5352
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81qw-myh7-pbdj
16
url VCID-8rxc-tf1r-wqgm
vulnerability_id VCID-8rxc-tf1r-wqgm
summary krb5: S4U2Self KDC crash when anon is restricted
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2591.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3120
reference_id
reference_type
scores
0
value 0.03262
scoring_system epss
scoring_elements 0.87089
published_at 2026-04-01T12:55:00Z
1
value 0.03262
scoring_system epss
scoring_elements 0.87161
published_at 2026-04-18T12:55:00Z
2
value 0.03262
scoring_system epss
scoring_elements 0.87145
published_at 2026-04-12T12:55:00Z
3
value 0.03262
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-13T12:55:00Z
4
value 0.03262
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-21T12:55:00Z
5
value 0.03262
scoring_system epss
scoring_elements 0.87099
published_at 2026-04-02T12:55:00Z
6
value 0.03262
scoring_system epss
scoring_elements 0.87117
published_at 2026-04-04T12:55:00Z
7
value 0.03262
scoring_system epss
scoring_elements 0.8711
published_at 2026-04-07T12:55:00Z
8
value 0.03262
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-08T12:55:00Z
9
value 0.03262
scoring_system epss
scoring_elements 0.87137
published_at 2026-04-09T12:55:00Z
10
value 0.03262
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3120
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
10
reference_url http://web.mit.edu/kerberos/krb5-1.13/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/krb5-1.13/
11
reference_url http://web.mit.edu/kerberos/krb5-1.14/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/krb5-1.14/
12
reference_url http://www.securityfocus.com/bid/92132
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/92132
13
reference_url http://www.securitytracker.com/id/1036442
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036442
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1361050
reference_id 1361050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1361050
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572
reference_id 832572
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3120
reference_id CVE-2016-3120
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3120
27
reference_url https://access.redhat.com/errata/RHSA-2016:2591
reference_id RHSA-2016:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2591
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2016-3120
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rxc-tf1r-wqgm
17
url VCID-8vzp-yn2u-1ugd
vulnerability_id VCID-8vzp-yn2u-1ugd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
reference_id
reference_type
scores
0
value 0.09562
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-21T12:55:00Z
1
value 0.09562
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-01T12:55:00Z
2
value 0.09562
scoring_system epss
scoring_elements 0.92842
published_at 2026-04-02T12:55:00Z
3
value 0.09562
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
4
value 0.09562
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
5
value 0.09562
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
6
value 0.09562
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-09T12:55:00Z
7
value 0.09562
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-13T12:55:00Z
8
value 0.09562
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-16T12:55:00Z
9
value 0.09562
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
6
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
15
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/46271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46271
18
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
21
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
22
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
23
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668726
reference_id 668726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668726
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
reference_id CVE-2011-0282
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
37
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
38
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
39
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
40
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0282
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzp-yn2u-1ugd
18
url VCID-8x5j-9wf8-wufr
vulnerability_id VCID-8x5j-9wf8-wufr
summary krb5: Assertion failure in GSSAPI SPNEGO mechanism (MITKRB5-SA-2010-002)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0628.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0628
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-01T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.75958
published_at 2026-04-02T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.75991
published_at 2026-04-04T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.7597
published_at 2026-04-07T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.76003
published_at 2026-04-08T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.76018
published_at 2026-04-09T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.76043
published_at 2026-04-11T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.7602
published_at 2026-04-12T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.76014
published_at 2026-04-13T12:55:00Z
9
value 0.00925
scoring_system epss
scoring_elements 0.76055
published_at 2026-04-16T12:55:00Z
10
value 0.00925
scoring_system epss
scoring_elements 0.76057
published_at 2026-04-18T12:55:00Z
11
value 0.00925
scoring_system epss
scoring_elements 0.76042
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566258
reference_id 566258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566258
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575740
reference_id 575740
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575740
5
reference_url https://usn.ubuntu.com/916-1/
reference_id USN-916-1
reference_type
scores
url https://usn.ubuntu.com/916-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-0628
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x5j-9wf8-wufr
19
url VCID-8yk4-du7p-eue4
vulnerability_id VCID-8yk4-du7p-eue4
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36222
reference_id
reference_type
scores
0
value 0.06615
scoring_system epss
scoring_elements 0.91209
published_at 2026-04-21T12:55:00Z
1
value 0.06615
scoring_system epss
scoring_elements 0.91183
published_at 2026-04-12T12:55:00Z
2
value 0.06615
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
3
value 0.06615
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-18T12:55:00Z
4
value 0.09227
scoring_system epss
scoring_elements 0.92692
published_at 2026-04-02T12:55:00Z
5
value 0.09227
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-07T12:55:00Z
6
value 0.09227
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-08T12:55:00Z
7
value 0.09227
scoring_system epss
scoring_elements 0.92711
published_at 2026-04-09T12:55:00Z
8
value 0.09227
scoring_system epss
scoring_elements 0.92716
published_at 2026-04-11T12:55:00Z
9
value 0.09227
scoring_system epss
scoring_elements 0.92684
published_at 2026-04-01T12:55:00Z
10
value 0.09227
scoring_system epss
scoring_elements 0.92698
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983720
reference_id 1983720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983720
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365
reference_id 991365
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365
6
reference_url https://security.archlinux.org/AVG-2173
reference_id AVG-2173
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2173
7
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
8
reference_url https://access.redhat.com/errata/RHSA-2021:3576
reference_id RHSA-2021:3576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3576
9
reference_url https://usn.ubuntu.com/5959-1/
reference_id USN-5959-1
reference_type
scores
url https://usn.ubuntu.com/5959-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2021-36222
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yk4-du7p-eue4
20
url VCID-97k8-xbsv-87da
vulnerability_id VCID-97k8-xbsv-87da
summary krb5: GSS message token handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37371
reference_id
reference_type
scores
0
value 0.02606
scoring_system epss
scoring_elements 0.85652
published_at 2026-04-21T12:55:00Z
1
value 0.02606
scoring_system epss
scoring_elements 0.85621
published_at 2026-04-09T12:55:00Z
2
value 0.02606
scoring_system epss
scoring_elements 0.85635
published_at 2026-04-11T12:55:00Z
3
value 0.02606
scoring_system epss
scoring_elements 0.85632
published_at 2026-04-12T12:55:00Z
4
value 0.02606
scoring_system epss
scoring_elements 0.85628
published_at 2026-04-13T12:55:00Z
5
value 0.02606
scoring_system epss
scoring_elements 0.85651
published_at 2026-04-16T12:55:00Z
6
value 0.02606
scoring_system epss
scoring_elements 0.85656
published_at 2026-04-18T12:55:00Z
7
value 0.02606
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-02T12:55:00Z
8
value 0.02606
scoring_system epss
scoring_elements 0.85586
published_at 2026-04-04T12:55:00Z
9
value 0.02606
scoring_system epss
scoring_elements 0.8559
published_at 2026-04-07T12:55:00Z
10
value 0.02606
scoring_system epss
scoring_elements 0.8561
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37371
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2294676
reference_id 2294676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2294676
6
reference_url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_id 55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/
url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
7
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/
url https://web.mit.edu/kerberos/www/advisories/
8
reference_url https://security.archlinux.org/AVG-2856
reference_id AVG-2856
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2856
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:4734
reference_id RHSA-2024:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4734
12
reference_url https://access.redhat.com/errata/RHSA-2024:4743
reference_id RHSA-2024:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4743
13
reference_url https://access.redhat.com/errata/RHSA-2024:5076
reference_id RHSA-2024:5076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5076
14
reference_url https://access.redhat.com/errata/RHSA-2024:5312
reference_id RHSA-2024:5312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5312
15
reference_url https://access.redhat.com/errata/RHSA-2024:5316
reference_id RHSA-2024:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5316
16
reference_url https://access.redhat.com/errata/RHSA-2024:5625
reference_id RHSA-2024:5625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5625
17
reference_url https://access.redhat.com/errata/RHSA-2024:5630
reference_id RHSA-2024:5630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5630
18
reference_url https://access.redhat.com/errata/RHSA-2024:5643
reference_id RHSA-2024:5643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5643
19
reference_url https://access.redhat.com/errata/RHSA-2024:5884
reference_id RHSA-2024:5884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5884
20
reference_url https://access.redhat.com/errata/RHSA-2024:6166
reference_id RHSA-2024:6166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6166
21
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
22
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
23
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
24
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
25
reference_url https://usn.ubuntu.com/6947-1/
reference_id USN-6947-1
reference_type
scores
url https://usn.ubuntu.com/6947-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2024-37371
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97k8-xbsv-87da
21
url VCID-985p-gnv3-mfd8
vulnerability_id VCID-985p-gnv3-mfd8
summary krb5: DN container check bypass by supplying special crafted data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5730
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62087
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62236
published_at 2026-04-21T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62245
published_at 2026-04-16T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-18T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62148
published_at 2026-04-02T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62179
published_at 2026-04-04T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62147
published_at 2026-04-07T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62197
published_at 2026-04-08T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62214
published_at 2026-04-09T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62232
published_at 2026-04-11T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62222
published_at 2026-04-12T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551082
reference_id 1551082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551082
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
reference_id 891869
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
6
reference_url https://security.archlinux.org/ASA-201806-3
reference_id ASA-201806-3
reference_type
scores
url https://security.archlinux.org/ASA-201806-3
7
reference_url https://security.archlinux.org/AVG-586
reference_id AVG-586
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-586
8
reference_url https://access.redhat.com/errata/RHSA-2018:3071
reference_id RHSA-2018:3071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3071
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5730
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-985p-gnv3-mfd8
22
url VCID-9d6t-z5dr-yqgy
vulnerability_id VCID-9d6t-z5dr-yqgy
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4343
reference_id
reference_type
scores
0
value 0.07384
scoring_system epss
scoring_elements 0.91744
published_at 2026-04-21T12:55:00Z
1
value 0.07384
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-01T12:55:00Z
2
value 0.07384
scoring_system epss
scoring_elements 0.91695
published_at 2026-04-02T12:55:00Z
3
value 0.07384
scoring_system epss
scoring_elements 0.91701
published_at 2026-04-04T12:55:00Z
4
value 0.07384
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-07T12:55:00Z
5
value 0.07384
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-08T12:55:00Z
6
value 0.07384
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-09T12:55:00Z
7
value 0.07384
scoring_system epss
scoring_elements 0.91731
published_at 2026-04-11T12:55:00Z
8
value 0.07384
scoring_system epss
scoring_elements 0.91733
published_at 2026-04-12T12:55:00Z
9
value 0.07384
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-13T12:55:00Z
10
value 0.07384
scoring_system epss
scoring_elements 0.91749
published_at 2026-04-16T12:55:00Z
11
value 0.07384
scoring_system epss
scoring_elements 0.91742
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://secunia.com/advisories/61052
reference_id
reference_type
scores
url http://secunia.com/advisories/61052
16
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95211
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95211
18
reference_url https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
19
reference_url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
reference_id
reference_type
scores
url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
20
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
21
reference_url http://www.osvdb.org/109390
reference_id
reference_type
scores
url http://www.osvdb.org/109390
22
reference_url http://www.securityfocus.com/bid/69159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69159
23
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121876
reference_id 1121876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121876
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520
reference_id 755520
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4343
reference_id CVE-2014-4343
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4343
45
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
46
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
47
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
48
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4343
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9d6t-z5dr-yqgy
23
url VCID-9hyk-mdvc-1baq
vulnerability_id VCID-9hyk-mdvc-1baq
summary krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11368
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.71555
published_at 2026-04-01T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-21T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.7161
published_at 2026-04-12T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71591
published_at 2026-04-13T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71636
published_at 2026-04-16T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-18T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71561
published_at 2026-04-02T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.71578
published_at 2026-04-04T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71551
published_at 2026-04-07T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71592
published_at 2026-04-08T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71602
published_at 2026-04-09T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71625
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473560
reference_id 1473560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473560
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260
reference_id 869260
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260
6
reference_url https://security.archlinux.org/ASA-201710-8
reference_id ASA-201710-8
reference_type
scores
url https://security.archlinux.org/ASA-201710-8
7
reference_url https://security.archlinux.org/AVG-414
reference_id AVG-414
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-414
8
reference_url https://security.archlinux.org/AVG-436
reference_id AVG-436
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-436
9
reference_url https://access.redhat.com/errata/RHSA-2018:0666
reference_id RHSA-2018:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0666
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-11368
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hyk-mdvc-1baq
24
url VCID-a9bp-26kx-p7cb
vulnerability_id VCID-a9bp-26kx-p7cb
summary security flaw
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0971
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28961
published_at 2026-04-21T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29049
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29127
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29177
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.28987
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29052
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29094
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29099
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29055
published_at 2026-04-12T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29005
published_at 2026-04-13T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29029
published_at 2026-04-16T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29006
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
5
reference_url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
7
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
8
reference_url http://www.redhat.com/support/errata/RHSA-2005-012.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-012.html
9
reference_url http://www.securityfocus.com/bid/11289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11289
10
reference_url http://www.trustix.org/errata/2004/0050
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0050
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617336
reference_id 1617336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617336
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271
reference_id 278271
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0971
reference_id CVE-2004-0971
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2004-0971
15
reference_url https://access.redhat.com/errata/RHSA-2005:012
reference_id RHSA-2005:012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:012
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2004-0971
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9bp-26kx-p7cb
25
url VCID-ahrt-vcg3-tbc2
vulnerability_id VCID-ahrt-vcg3-tbc2
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0748.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0748.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1416
reference_id
reference_type
scores
0
value 0.02274
scoring_system epss
scoring_elements 0.84681
published_at 2026-04-21T12:55:00Z
1
value 0.02274
scoring_system epss
scoring_elements 0.8468
published_at 2026-04-18T12:55:00Z
2
value 0.02274
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-01T12:55:00Z
3
value 0.02274
scoring_system epss
scoring_elements 0.84599
published_at 2026-04-02T12:55:00Z
4
value 0.02274
scoring_system epss
scoring_elements 0.84619
published_at 2026-04-04T12:55:00Z
5
value 0.02274
scoring_system epss
scoring_elements 0.84621
published_at 2026-04-07T12:55:00Z
6
value 0.02274
scoring_system epss
scoring_elements 0.84643
published_at 2026-04-08T12:55:00Z
7
value 0.02274
scoring_system epss
scoring_elements 0.84649
published_at 2026-04-09T12:55:00Z
8
value 0.02274
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-11T12:55:00Z
9
value 0.02274
scoring_system epss
scoring_elements 0.84662
published_at 2026-04-12T12:55:00Z
10
value 0.02274
scoring_system epss
scoring_elements 0.84657
published_at 2026-04-13T12:55:00Z
11
value 0.02274
scoring_system epss
scoring_elements 0.84679
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1416
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
reference_id 704775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=949984
reference_id 949984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=949984
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1416
reference_id CVE-2013-1416
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1416
29
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
30
reference_url https://access.redhat.com/errata/RHSA-2013:0748
reference_id RHSA-2013:0748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0748
31
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2013-1416
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahrt-vcg3-tbc2
26
url VCID-bdbh-trh7-8fd6
vulnerability_id VCID-bdbh-trh7-8fd6
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78921
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78946
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-21T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.7896
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.7895
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-4151
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbh-trh7-8fd6
27
url VCID-bnpa-8svd-jyct
vulnerability_id VCID-bnpa-8svd-jyct
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2697
reference_id
reference_type
scores
0
value 0.06393
scoring_system epss
scoring_elements 0.91048
published_at 2026-04-18T12:55:00Z
1
value 0.06393
scoring_system epss
scoring_elements 0.9105
published_at 2026-04-21T12:55:00Z
2
value 0.06393
scoring_system epss
scoring_elements 0.90974
published_at 2026-04-01T12:55:00Z
3
value 0.06393
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-02T12:55:00Z
4
value 0.06393
scoring_system epss
scoring_elements 0.90989
published_at 2026-04-04T12:55:00Z
5
value 0.06393
scoring_system epss
scoring_elements 0.90999
published_at 2026-04-07T12:55:00Z
6
value 0.06393
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-08T12:55:00Z
7
value 0.06393
scoring_system epss
scoring_elements 0.91017
published_at 2026-04-09T12:55:00Z
8
value 0.06393
scoring_system epss
scoring_elements 0.91025
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2697
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
11
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.securityfocus.com/bid/77581
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77581
14
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
15
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275863
reference_id 1275863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275863
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088
reference_id 803088
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2697
reference_id CVE-2015-2697
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-2697
34
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
35
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2697
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpa-8svd-jyct
28
url VCID-bwpn-qxzd-43g8
vulnerability_id VCID-bwpn-qxzd-43g8
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-36054
reference_id
reference_type
scores
0
value 0.00648
scoring_system epss
scoring_elements 0.70806
published_at 2026-04-21T12:55:00Z
1
value 0.01116
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-02T12:55:00Z
2
value 0.01116
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-08T12:55:00Z
3
value 0.01116
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-09T12:55:00Z
4
value 0.01116
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-11T12:55:00Z
5
value 0.01116
scoring_system epss
scoring_elements 0.78199
published_at 2026-04-12T12:55:00Z
6
value 0.01116
scoring_system epss
scoring_elements 0.78196
published_at 2026-04-13T12:55:00Z
7
value 0.01116
scoring_system epss
scoring_elements 0.78227
published_at 2026-04-16T12:55:00Z
8
value 0.01116
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-18T12:55:00Z
9
value 0.01116
scoring_system epss
scoring_elements 0.78176
published_at 2026-04-04T12:55:00Z
10
value 0.01116
scoring_system epss
scoring_elements 0.78158
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-36054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431
reference_id 1043431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230178
reference_id 2230178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230178
6
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://web.mit.edu/kerberos/www/advisories/
7
reference_url https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
reference_id ef08b09c9459551aabbe7924fb176f1583053cdd
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
8
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
9
reference_url https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
reference_id krb5-1.20.1-final...krb5-1.20.2-final
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
10
reference_url https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
reference_id krb5-1.21-final...krb5-1.21.1-final
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
11
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html
12
reference_url https://security.netapp.com/advisory/ntap-20230908-0004/
reference_id ntap-20230908-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://security.netapp.com/advisory/ntap-20230908-0004/
13
reference_url https://access.redhat.com/errata/RHSA-2023:6699
reference_id RHSA-2023:6699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6699
14
reference_url https://usn.ubuntu.com/6467-1/
reference_id USN-6467-1
reference_type
scores
url https://usn.ubuntu.com/6467-1/
15
reference_url https://usn.ubuntu.com/6467-2/
reference_id USN-6467-2
reference_type
scores
url https://usn.ubuntu.com/6467-2/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2023-36054
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwpn-qxzd-43g8
29
url VCID-caxe-5ejt-ffgy
vulnerability_id VCID-caxe-5ejt-ffgy
summary krb5: IAKERB context export/import
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2698
reference_id
reference_type
scores
0
value 0.00867
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-18T12:55:00Z
1
value 0.00867
scoring_system epss
scoring_elements 0.75098
published_at 2026-04-01T12:55:00Z
2
value 0.00867
scoring_system epss
scoring_elements 0.751
published_at 2026-04-02T12:55:00Z
3
value 0.00867
scoring_system epss
scoring_elements 0.75129
published_at 2026-04-04T12:55:00Z
4
value 0.00867
scoring_system epss
scoring_elements 0.75106
published_at 2026-04-07T12:55:00Z
5
value 0.00867
scoring_system epss
scoring_elements 0.75141
published_at 2026-04-13T12:55:00Z
6
value 0.00867
scoring_system epss
scoring_elements 0.75153
published_at 2026-04-12T12:55:00Z
7
value 0.00867
scoring_system epss
scoring_elements 0.75174
published_at 2026-04-21T12:55:00Z
8
value 0.00867
scoring_system epss
scoring_elements 0.75178
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2698
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698
6
reference_url https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
7
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1278951
reference_id 1278951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1278951
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2698
reference_id CVE-2015-2698
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-2698
11
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2698
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-caxe-5ejt-ffgy
30
url VCID-d1a1-yfu1-kuaz
vulnerability_id VCID-d1a1-yfu1-kuaz
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4342
reference_id
reference_type
scores
0
value 0.08139
scoring_system epss
scoring_elements 0.92182
published_at 2026-04-21T12:55:00Z
1
value 0.08139
scoring_system epss
scoring_elements 0.9218
published_at 2026-04-18T12:55:00Z
2
value 0.08139
scoring_system epss
scoring_elements 0.92138
published_at 2026-04-01T12:55:00Z
3
value 0.08139
scoring_system epss
scoring_elements 0.92145
published_at 2026-04-02T12:55:00Z
4
value 0.08139
scoring_system epss
scoring_elements 0.92151
published_at 2026-04-04T12:55:00Z
5
value 0.08139
scoring_system epss
scoring_elements 0.92155
published_at 2026-04-07T12:55:00Z
6
value 0.08139
scoring_system epss
scoring_elements 0.92166
published_at 2026-04-08T12:55:00Z
7
value 0.08139
scoring_system epss
scoring_elements 0.92169
published_at 2026-04-09T12:55:00Z
8
value 0.08139
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-12T12:55:00Z
9
value 0.08139
scoring_system epss
scoring_elements 0.9217
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4342
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
10
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
11
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94903
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94903
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
15
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
18
reference_url http://www.securityfocus.com/bid/68908
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68908
19
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120581
reference_id 1120581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120581
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625
reference_id 753625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4342
reference_id CVE-2014-4342
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4342
58
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
59
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
60
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4342
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1a1-yfu1-kuaz
31
url VCID-dj1x-1chn-bbhz
vulnerability_id VCID-dj1x-1chn-bbhz
summary krb5: PKINIT null pointer deref leads to DoS (pkinit_check_kdc_pkid())
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1415
reference_id
reference_type
scores
0
value 0.01588
scoring_system epss
scoring_elements 0.81662
published_at 2026-04-21T12:55:00Z
1
value 0.01588
scoring_system epss
scoring_elements 0.81557
published_at 2026-04-01T12:55:00Z
2
value 0.01588
scoring_system epss
scoring_elements 0.81569
published_at 2026-04-02T12:55:00Z
3
value 0.01588
scoring_system epss
scoring_elements 0.8159
published_at 2026-04-04T12:55:00Z
4
value 0.01588
scoring_system epss
scoring_elements 0.81588
published_at 2026-04-07T12:55:00Z
5
value 0.01588
scoring_system epss
scoring_elements 0.81616
published_at 2026-04-08T12:55:00Z
6
value 0.01588
scoring_system epss
scoring_elements 0.81621
published_at 2026-04-13T12:55:00Z
7
value 0.01588
scoring_system epss
scoring_elements 0.81641
published_at 2026-04-11T12:55:00Z
8
value 0.01588
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-12T12:55:00Z
9
value 0.01588
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1415
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415
6
reference_url http://secunia.com/advisories/55040
reference_id
reference_type
scores
url http://secunia.com/advisories/55040
7
reference_url https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e
8
reference_url http://web.mit.edu/kerberos/www/krb5-1.10/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.10/
9
reference_url http://web.mit.edu/kerberos/www/krb5-1.11/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.11/
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=914749
reference_id 914749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=914749
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1415
reference_id CVE-2013-1415
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1415
16
reference_url https://access.redhat.com/errata/RHSA-2013:0656
reference_id RHSA-2013:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0656
17
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2013-1415
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1x-1chn-bbhz
32
url VCID-dq1q-jbpx-8fhb
vulnerability_id VCID-dq1q-jbpx-8fhb
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0847.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0847.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0847
reference_id
reference_type
scores
0
value 0.20287
scoring_system epss
scoring_elements 0.95482
published_at 2026-04-01T12:55:00Z
1
value 0.20287
scoring_system epss
scoring_elements 0.95491
published_at 2026-04-02T12:55:00Z
2
value 0.20287
scoring_system epss
scoring_elements 0.95497
published_at 2026-04-04T12:55:00Z
3
value 0.20287
scoring_system epss
scoring_elements 0.95502
published_at 2026-04-07T12:55:00Z
4
value 0.20287
scoring_system epss
scoring_elements 0.95508
published_at 2026-04-08T12:55:00Z
5
value 0.20287
scoring_system epss
scoring_elements 0.95511
published_at 2026-04-09T12:55:00Z
6
value 0.20287
scoring_system epss
scoring_elements 0.95515
published_at 2026-04-11T12:55:00Z
7
value 0.20287
scoring_system epss
scoring_elements 0.95517
published_at 2026-04-12T12:55:00Z
8
value 0.20287
scoring_system epss
scoring_elements 0.95518
published_at 2026-04-13T12:55:00Z
9
value 0.20287
scoring_system epss
scoring_elements 0.95526
published_at 2026-04-16T12:55:00Z
10
value 0.20287
scoring_system epss
scoring_elements 0.95531
published_at 2026-04-18T12:55:00Z
11
value 0.20287
scoring_system epss
scoring_elements 0.95533
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0847
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491034
reference_id 491034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491034
4
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
5
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-0847
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dq1q-jbpx-8fhb
33
url VCID-dv1m-kz1r-8udu
vulnerability_id VCID-dv1m-kz1r-8udu
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
4
reference_url http://osvdb.org/71183
reference_id
reference_type
scores
url http://osvdb.org/71183
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
reference_id
reference_type
scores
0
value 0.2264
scoring_system epss
scoring_elements 0.95874
published_at 2026-04-21T12:55:00Z
1
value 0.2264
scoring_system epss
scoring_elements 0.95819
published_at 2026-04-01T12:55:00Z
2
value 0.2264
scoring_system epss
scoring_elements 0.95827
published_at 2026-04-02T12:55:00Z
3
value 0.2264
scoring_system epss
scoring_elements 0.95836
published_at 2026-04-04T12:55:00Z
4
value 0.2264
scoring_system epss
scoring_elements 0.95838
published_at 2026-04-07T12:55:00Z
5
value 0.2264
scoring_system epss
scoring_elements 0.95847
published_at 2026-04-08T12:55:00Z
6
value 0.2264
scoring_system epss
scoring_elements 0.9585
published_at 2026-04-09T12:55:00Z
7
value 0.2264
scoring_system epss
scoring_elements 0.95853
published_at 2026-04-12T12:55:00Z
8
value 0.2264
scoring_system epss
scoring_elements 0.95854
published_at 2026-04-13T12:55:00Z
9
value 0.2264
scoring_system epss
scoring_elements 0.95866
published_at 2026-04-16T12:55:00Z
10
value 0.2264
scoring_system epss
scoring_elements 0.95871
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
8
reference_url http://secunia.com/advisories/43700
reference_id
reference_type
scores
url http://secunia.com/advisories/43700
9
reference_url http://secunia.com/advisories/43760
reference_id
reference_type
scores
url http://secunia.com/advisories/43760
10
reference_url http://secunia.com/advisories/43783
reference_id
reference_type
scores
url http://secunia.com/advisories/43783
11
reference_url http://secunia.com/advisories/43881
reference_id
reference_type
scores
url http://secunia.com/advisories/43881
12
reference_url http://securitytracker.com/id?1025216
reference_id
reference_type
scores
url http://securitytracker.com/id?1025216
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
14
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
15
reference_url http://www.kb.cert.org/vuls/id/943220
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/943220
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0356.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0356.html
18
reference_url http://www.securityfocus.com/archive/1/517029/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517029/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/46881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46881
20
reference_url http://www.ubuntu.com/usn/USN-1088-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1088-1
21
reference_url http://www.vupen.com/english/advisories/2011/0672
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0672
22
reference_url http://www.vupen.com/english/advisories/2011/0673
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0673
23
reference_url http://www.vupen.com/english/advisories/2011/0680
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0680
24
reference_url http://www.vupen.com/english/advisories/2011/0722
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0722
25
reference_url http://www.vupen.com/english/advisories/2011/0763
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0763
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
reference_id 618517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=674325
reference_id 674325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=674325
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
reference_id CVE-2011-0284
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
36
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
37
reference_url https://access.redhat.com/errata/RHSA-2011:0356
reference_id RHSA-2011:0356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0356
38
reference_url https://usn.ubuntu.com/1088-1/
reference_id USN-1088-1
reference_type
scores
url https://usn.ubuntu.com/1088-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0284
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv1m-kz1r-8udu
34
url VCID-dzr3-ncxx-jkck
vulnerability_id VCID-dzr3-ncxx-jkck
summary krb5: NULL pointer dereference when using keyless entries
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5354
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.6768
published_at 2026-04-18T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-01T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67593
published_at 2026-04-07T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67614
published_at 2026-04-04T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67645
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67659
published_at 2026-04-21T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67682
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67666
published_at 2026-04-12T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67634
published_at 2026-04-13T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67668
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354
4
reference_url https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16
5
reference_url http://www.securityfocus.com/bid/71680
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71680
6
reference_url http://www.securitytracker.com/id/1031376
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031376
7
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174546
reference_id 1174546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174546
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228
reference_id 773228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5354
reference_id CVE-2014-5354
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5354
15
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5354
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzr3-ncxx-jkck
35
url VCID-e81a-vujj-yfcs
vulnerability_id VCID-e81a-vujj-yfcs
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
3
reference_url http://osvdb.org/71789
reference_id
reference_type
scores
url http://osvdb.org/71789
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
reference_id
reference_type
scores
0
value 0.54024
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-21T12:55:00Z
1
value 0.54024
scoring_system epss
scoring_elements 0.97994
published_at 2026-04-01T12:55:00Z
2
value 0.54024
scoring_system epss
scoring_elements 0.97998
published_at 2026-04-02T12:55:00Z
3
value 0.54024
scoring_system epss
scoring_elements 0.98
published_at 2026-04-04T12:55:00Z
4
value 0.54024
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-07T12:55:00Z
5
value 0.54024
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-08T12:55:00Z
6
value 0.54024
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-09T12:55:00Z
7
value 0.54024
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-11T12:55:00Z
8
value 0.54024
scoring_system epss
scoring_elements 0.98013
published_at 2026-04-12T12:55:00Z
9
value 0.54024
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-13T12:55:00Z
10
value 0.54024
scoring_system epss
scoring_elements 0.9802
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
7
reference_url http://secunia.com/advisories/44125
reference_id
reference_type
scores
url http://secunia.com/advisories/44125
8
reference_url http://secunia.com/advisories/44181
reference_id
reference_type
scores
url http://secunia.com/advisories/44181
9
reference_url http://secunia.com/advisories/44196
reference_id
reference_type
scores
url http://secunia.com/advisories/44196
10
reference_url http://securityreason.com/securityalert/8200
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8200
11
reference_url https://hermes.opensuse.org/messages/8086843
reference_id
reference_type
scores
url https://hermes.opensuse.org/messages/8086843
12
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0447.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0447.html
15
reference_url http://www.securityfocus.com/archive/1/517484/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517484/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/47310
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47310
17
reference_url http://www.securitytracker.com/id?1025320
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025320
18
reference_url http://www.vupen.com/english/advisories/2011/0936
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0936
19
reference_url http://www.vupen.com/english/advisories/2011/0986
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0986
20
reference_url http://www.vupen.com/english/advisories/2011/0997
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0997
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
reference_id 622681
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=696334
reference_id 696334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=696334
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
reference_id CVE-2011-0285
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
32
reference_url https://www.securityfocus.com/bid/47310/info
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://www.securityfocus.com/bid/47310/info
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2011:0447
reference_id RHSA-2011:0447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0447
35
reference_url https://usn.ubuntu.com/1116-1/
reference_id USN-1116-1
reference_type
scores
url https://usn.ubuntu.com/1116-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0285
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e81a-vujj-yfcs
36
url VCID-erjs-zb26-eubh
vulnerability_id VCID-erjs-zb26-eubh
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0283
reference_id
reference_type
scores
0
value 0.03728
scoring_system epss
scoring_elements 0.87934
published_at 2026-04-01T12:55:00Z
1
value 0.03728
scoring_system epss
scoring_elements 0.87944
published_at 2026-04-02T12:55:00Z
2
value 0.03728
scoring_system epss
scoring_elements 0.87958
published_at 2026-04-04T12:55:00Z
3
value 0.03728
scoring_system epss
scoring_elements 0.87962
published_at 2026-04-07T12:55:00Z
4
value 0.03728
scoring_system epss
scoring_elements 0.87982
published_at 2026-04-08T12:55:00Z
5
value 0.03728
scoring_system epss
scoring_elements 0.87989
published_at 2026-04-09T12:55:00Z
6
value 0.03728
scoring_system epss
scoring_elements 0.88
published_at 2026-04-11T12:55:00Z
7
value 0.03728
scoring_system epss
scoring_elements 0.87993
published_at 2026-04-12T12:55:00Z
8
value 0.03728
scoring_system epss
scoring_elements 0.87992
published_at 2026-04-13T12:55:00Z
9
value 0.03728
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-16T12:55:00Z
10
value 0.03728
scoring_system epss
scoring_elements 0.88005
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=556680
reference_id 556680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=556680
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://usn.ubuntu.com/916-1/
reference_id USN-916-1
reference_type
scores
url https://usn.ubuntu.com/916-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-0283
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-erjs-zb26-eubh
37
url VCID-fd9s-vn5s-gud6
vulnerability_id VCID-fd9s-vn5s-gud6
summary krb5: Reachable assertion in the KDC using S4U2Self requests
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20217
reference_id
reference_type
scores
0
value 0.02377
scoring_system epss
scoring_elements 0.85004
published_at 2026-04-21T12:55:00Z
1
value 0.02377
scoring_system epss
scoring_elements 0.84984
published_at 2026-04-13T12:55:00Z
2
value 0.02377
scoring_system epss
scoring_elements 0.85005
published_at 2026-04-16T12:55:00Z
3
value 0.02377
scoring_system epss
scoring_elements 0.85007
published_at 2026-04-18T12:55:00Z
4
value 0.02665
scoring_system epss
scoring_elements 0.85735
published_at 2026-04-02T12:55:00Z
5
value 0.02665
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-04T12:55:00Z
6
value 0.02665
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-07T12:55:00Z
7
value 0.02665
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-08T12:55:00Z
8
value 0.02665
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-09T12:55:00Z
9
value 0.02665
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-11T12:55:00Z
10
value 0.02665
scoring_system epss
scoring_elements 0.85801
published_at 2026-04-12T12:55:00Z
11
value 0.02665
scoring_system epss
scoring_elements 0.85723
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
6
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
7
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
9
reference_url https://security.netapp.com/advisory/ntap-20190416-0006/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190416-0006/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665296
reference_id 1665296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665296
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387
reference_id 917387
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20217
reference_id CVE-2018-20217
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20217
16
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-20217
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd9s-vn5s-gud6
38
url VCID-fg2w-sjkb-ebgb
vulnerability_id VCID-fg2w-sjkb-ebgb
summary security update
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0493.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0493.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8629
reference_id
reference_type
scores
0
value 0.0161
scoring_system epss
scoring_elements 0.81797
published_at 2026-04-21T12:55:00Z
1
value 0.0161
scoring_system epss
scoring_elements 0.81793
published_at 2026-04-16T12:55:00Z
2
value 0.0161
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-18T12:55:00Z
3
value 0.0161
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-01T12:55:00Z
4
value 0.0161
scoring_system epss
scoring_elements 0.81702
published_at 2026-04-02T12:55:00Z
5
value 0.0161
scoring_system epss
scoring_elements 0.81725
published_at 2026-04-04T12:55:00Z
6
value 0.0161
scoring_system epss
scoring_elements 0.81723
published_at 2026-04-07T12:55:00Z
7
value 0.0161
scoring_system epss
scoring_elements 0.8175
published_at 2026-04-08T12:55:00Z
8
value 0.0161
scoring_system epss
scoring_elements 0.81754
published_at 2026-04-09T12:55:00Z
9
value 0.0161
scoring_system epss
scoring_elements 0.81773
published_at 2026-04-11T12:55:00Z
10
value 0.0161
scoring_system epss
scoring_elements 0.81761
published_at 2026-04-12T12:55:00Z
11
value 0.0161
scoring_system epss
scoring_elements 0.81756
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
11
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
14
reference_url http://www.securityfocus.com/bid/82801
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82801
15
reference_url http://www.securitytracker.com/id/1034914
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034914
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302617
reference_id 1302617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302617
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296
reference_id 813296
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8629
reference_id CVE-2015-8629
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8629
50
reference_url https://access.redhat.com/errata/RHSA-2016:0493
reference_id RHSA-2016:0493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0493
51
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8629
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fg2w-sjkb-ebgb
39
url VCID-h9q8-x3n3-6qdn
vulnerability_id VCID-h9q8-x3n3-6qdn
summary
A vulnerability in MIT Kerberos 5 could lead to a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28196
reference_id
reference_type
scores
0
value 0.01293
scoring_system epss
scoring_elements 0.79705
published_at 2026-04-21T12:55:00Z
1
value 0.01293
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-18T12:55:00Z
2
value 0.01293
scoring_system epss
scoring_elements 0.79624
published_at 2026-04-01T12:55:00Z
3
value 0.01293
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-11T12:55:00Z
4
value 0.01293
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-09T12:55:00Z
5
value 0.01293
scoring_system epss
scoring_elements 0.79631
published_at 2026-04-02T12:55:00Z
6
value 0.01293
scoring_system epss
scoring_elements 0.79653
published_at 2026-04-04T12:55:00Z
7
value 0.01293
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-07T12:55:00Z
8
value 0.01293
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-08T12:55:00Z
9
value 0.01293
scoring_system epss
scoring_elements 0.79701
published_at 2026-04-16T12:55:00Z
10
value 0.01293
scoring_system epss
scoring_elements 0.79673
published_at 2026-04-13T12:55:00Z
11
value 0.01293
scoring_system epss
scoring_elements 0.7968
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901041
reference_id 1901041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901041
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
reference_id 45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
6
reference_url https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
reference_id 57415dda6cf04e73ffc3723be518eddfae599bfd
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
reference_id 73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880
reference_id 973880
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880
9
reference_url https://www.debian.org/security/2020/dsa-4795
reference_id dsa-4795
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://www.debian.org/security/2020/dsa-4795
10
reference_url https://security.gentoo.org/glsa/202011-17
reference_id GLSA-202011-17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://security.gentoo.org/glsa/202011-17
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
reference_id KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
12
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
13
reference_url https://security.netapp.com/advisory/ntap-20201202-0001/
reference_id ntap-20201202-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://security.netapp.com/advisory/ntap-20201202-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2021:1593
reference_id RHSA-2021:1593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1593
15
reference_url https://access.redhat.com/errata/RHSA-2021:2239
reference_id RHSA-2021:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2239
16
reference_url https://usn.ubuntu.com/4635-1/
reference_id USN-4635-1
reference_type
scores
url https://usn.ubuntu.com/4635-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2020-28196
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9q8-x3n3-6qdn
40
url VCID-hryp-mt7d-kygt
vulnerability_id VCID-hryp-mt7d-kygt
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0844
reference_id
reference_type
scores
0
value 0.03433
scoring_system epss
scoring_elements 0.8742
published_at 2026-04-01T12:55:00Z
1
value 0.03433
scoring_system epss
scoring_elements 0.8743
published_at 2026-04-02T12:55:00Z
2
value 0.03433
scoring_system epss
scoring_elements 0.87444
published_at 2026-04-04T12:55:00Z
3
value 0.03433
scoring_system epss
scoring_elements 0.87446
published_at 2026-04-07T12:55:00Z
4
value 0.03433
scoring_system epss
scoring_elements 0.87465
published_at 2026-04-08T12:55:00Z
5
value 0.03433
scoring_system epss
scoring_elements 0.87472
published_at 2026-04-09T12:55:00Z
6
value 0.03433
scoring_system epss
scoring_elements 0.87484
published_at 2026-04-11T12:55:00Z
7
value 0.03433
scoring_system epss
scoring_elements 0.87479
published_at 2026-04-12T12:55:00Z
8
value 0.03433
scoring_system epss
scoring_elements 0.87476
published_at 2026-04-13T12:55:00Z
9
value 0.03433
scoring_system epss
scoring_elements 0.8749
published_at 2026-04-21T12:55:00Z
10
value 0.03433
scoring_system epss
scoring_elements 0.87492
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491033
reference_id 491033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491033
4
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
5
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
6
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-0844
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hryp-mt7d-kygt
41
url VCID-j6tv-fz95-3kb8
vulnerability_id VCID-j6tv-fz95-3kb8
summary krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2694
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75463
published_at 2026-04-01T12:55:00Z
1
value 0.0089
scoring_system epss
scoring_elements 0.75465
published_at 2026-04-02T12:55:00Z
2
value 0.0089
scoring_system epss
scoring_elements 0.75497
published_at 2026-04-04T12:55:00Z
3
value 0.0089
scoring_system epss
scoring_elements 0.75477
published_at 2026-04-07T12:55:00Z
4
value 0.0089
scoring_system epss
scoring_elements 0.75519
published_at 2026-04-08T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75529
published_at 2026-04-09T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-11T12:55:00Z
7
value 0.0089
scoring_system epss
scoring_elements 0.75527
published_at 2026-04-12T12:55:00Z
8
value 0.0089
scoring_system epss
scoring_elements 0.75517
published_at 2026-04-13T12:55:00Z
9
value 0.0089
scoring_system epss
scoring_elements 0.7556
published_at 2026-04-16T12:55:00Z
10
value 0.0089
scoring_system epss
scoring_elements 0.75566
published_at 2026-04-18T12:55:00Z
11
value 0.0089
scoring_system epss
scoring_elements 0.75552
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1216133
reference_id 1216133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1216133
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557
reference_id 783557
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557
5
reference_url https://access.redhat.com/errata/RHSA-2015:2154
reference_id RHSA-2015:2154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2154
6
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2694
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6tv-fz95-3kb8
42
url VCID-j9uk-e9sc-y3gp
vulnerability_id VCID-j9uk-e9sc-y3gp
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0629
reference_id
reference_type
scores
0
value 0.02284
scoring_system epss
scoring_elements 0.84618
published_at 2026-04-01T12:55:00Z
1
value 0.02284
scoring_system epss
scoring_elements 0.84632
published_at 2026-04-02T12:55:00Z
2
value 0.02284
scoring_system epss
scoring_elements 0.84652
published_at 2026-04-04T12:55:00Z
3
value 0.02284
scoring_system epss
scoring_elements 0.84654
published_at 2026-04-07T12:55:00Z
4
value 0.02284
scoring_system epss
scoring_elements 0.84675
published_at 2026-04-08T12:55:00Z
5
value 0.02284
scoring_system epss
scoring_elements 0.84682
published_at 2026-04-09T12:55:00Z
6
value 0.02284
scoring_system epss
scoring_elements 0.847
published_at 2026-04-11T12:55:00Z
7
value 0.02284
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-12T12:55:00Z
8
value 0.02284
scoring_system epss
scoring_elements 0.8469
published_at 2026-04-13T12:55:00Z
9
value 0.02284
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-16T12:55:00Z
10
value 0.02284
scoring_system epss
scoring_elements 0.84712
published_at 2026-04-18T12:55:00Z
11
value 0.02284
scoring_system epss
scoring_elements 0.84713
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576011
reference_id 576011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576011
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2010:0343
reference_id RHSA-2010:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0343
6
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-0629
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9uk-e9sc-y3gp
43
url VCID-jask-8b2h-p3h8
vulnerability_id VCID-jask-8b2h-p3h8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9423
reference_id
reference_type
scores
0
value 0.01537
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-21T12:55:00Z
1
value 0.01537
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-01T12:55:00Z
2
value 0.01537
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-02T12:55:00Z
3
value 0.01537
scoring_system epss
scoring_elements 0.81314
published_at 2026-04-04T12:55:00Z
4
value 0.01537
scoring_system epss
scoring_elements 0.81313
published_at 2026-04-07T12:55:00Z
5
value 0.01537
scoring_system epss
scoring_elements 0.81342
published_at 2026-04-08T12:55:00Z
6
value 0.01537
scoring_system epss
scoring_elements 0.81347
published_at 2026-04-09T12:55:00Z
7
value 0.01537
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-11T12:55:00Z
8
value 0.01537
scoring_system epss
scoring_elements 0.81353
published_at 2026-04-12T12:55:00Z
9
value 0.01537
scoring_system epss
scoring_elements 0.81345
published_at 2026-04-13T12:55:00Z
10
value 0.01537
scoring_system epss
scoring_elements 0.81383
published_at 2026-04-16T12:55:00Z
11
value 0.01537
scoring_system epss
scoring_elements 0.81385
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179863
reference_id 1179863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179863
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9423
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jask-8b2h-p3h8
44
url VCID-jfb1-3vg4-vbap
vulnerability_id VCID-jfb1-3vg4-vbap
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
9
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
10
reference_url http://osvdb.org/64744
reference_id
reference_type
scores
url http://osvdb.org/64744
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
reference_id
reference_type
scores
0
value 0.01857
scoring_system epss
scoring_elements 0.83073
published_at 2026-04-21T12:55:00Z
1
value 0.01857
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-01T12:55:00Z
2
value 0.01857
scoring_system epss
scoring_elements 0.82985
published_at 2026-04-02T12:55:00Z
3
value 0.01857
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-04T12:55:00Z
4
value 0.01857
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-07T12:55:00Z
5
value 0.01857
scoring_system epss
scoring_elements 0.8302
published_at 2026-04-08T12:55:00Z
6
value 0.01857
scoring_system epss
scoring_elements 0.83027
published_at 2026-04-09T12:55:00Z
7
value 0.01857
scoring_system epss
scoring_elements 0.83043
published_at 2026-04-11T12:55:00Z
8
value 0.01857
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-12T12:55:00Z
9
value 0.01857
scoring_system epss
scoring_elements 0.83032
published_at 2026-04-13T12:55:00Z
10
value 0.01857
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
14
reference_url http://secunia.com/advisories/39762
reference_id
reference_type
scores
url http://secunia.com/advisories/39762
15
reference_url http://secunia.com/advisories/39784
reference_id
reference_type
scores
url http://secunia.com/advisories/39784
16
reference_url http://secunia.com/advisories/39799
reference_id
reference_type
scores
url http://secunia.com/advisories/39799
17
reference_url http://secunia.com/advisories/39818
reference_id
reference_type
scores
url http://secunia.com/advisories/39818
18
reference_url http://secunia.com/advisories/39849
reference_id
reference_type
scores
url http://secunia.com/advisories/39849
19
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
20
reference_url http://secunia.com/advisories/40685
reference_id
reference_type
scores
url http://secunia.com/advisories/40685
21
reference_url http://secunia.com/advisories/41967
reference_id
reference_type
scores
url http://secunia.com/advisories/41967
22
reference_url http://secunia.com/advisories/42432
reference_id
reference_type
scores
url http://secunia.com/advisories/42432
23
reference_url http://secunia.com/advisories/42974
reference_id
reference_type
scores
url http://secunia.com/advisories/42974
24
reference_url http://secunia.com/advisories/43335
reference_id
reference_type
scores
url http://secunia.com/advisories/43335
25
reference_url http://secunia.com/advisories/44954
reference_id
reference_type
scores
url http://secunia.com/advisories/44954
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
29
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114315
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
31
reference_url http://www.debian.org/security/2010/dsa-2052
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2052
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
34
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
35
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0423.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0423.html
38
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2010-0807.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0807.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2010-0873.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0873.html
41
reference_url http://www.redhat.com/support/errata/RHSA-2010-0935.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0935.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2010-0987.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0987.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2011-0152.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0152.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2011-0880.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0880.html
45
reference_url http://www.securityfocus.com/archive/1/511331/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/511331/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/516397/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516397/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/40235
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40235
48
reference_url http://www.ubuntu.com/usn/USN-940-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-1
49
reference_url http://www.ubuntu.com/usn/USN-940-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-2
50
reference_url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
51
reference_url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
52
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
53
reference_url http://www.vupen.com/english/advisories/2010/1177
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1177
54
reference_url http://www.vupen.com/english/advisories/2010/1192
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1192
55
reference_url http://www.vupen.com/english/advisories/2010/1193
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1193
56
reference_url http://www.vupen.com/english/advisories/2010/1196
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1196
57
reference_url http://www.vupen.com/english/advisories/2010/1222
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1222
58
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
59
reference_url http://www.vupen.com/english/advisories/2010/1882
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1882
60
reference_url http://www.vupen.com/english/advisories/2010/3112
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3112
61
reference_url http://www.vupen.com/english/advisories/2011/0134
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0134
62
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
reference_id 582261
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=582466
reference_id 582466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=582466
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
reference_id CVE-2010-1321
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
84
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
85
reference_url https://access.redhat.com/errata/RHSA-2010:0423
reference_id RHSA-2010:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0423
86
reference_url https://access.redhat.com/errata/RHSA-2010:0873
reference_id RHSA-2010:0873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0873
87
reference_url https://access.redhat.com/errata/RHSA-2010:0935
reference_id RHSA-2010:0935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0935
88
reference_url https://access.redhat.com/errata/RHSA-2011:0152
reference_id RHSA-2011:0152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0152
89
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
90
reference_url https://usn.ubuntu.com/940-2/
reference_id USN-940-2
reference_type
scores
url https://usn.ubuntu.com/940-2/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-1321
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap
45
url VCID-ka4c-q3hq-6fe3
vulnerability_id VCID-ka4c-q3hq-6fe3
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1418
reference_id
reference_type
scores
0
value 0.07674
scoring_system epss
scoring_elements 0.91863
published_at 2026-04-01T12:55:00Z
1
value 0.07674
scoring_system epss
scoring_elements 0.91872
published_at 2026-04-02T12:55:00Z
2
value 0.07674
scoring_system epss
scoring_elements 0.91879
published_at 2026-04-04T12:55:00Z
3
value 0.07674
scoring_system epss
scoring_elements 0.91886
published_at 2026-04-07T12:55:00Z
4
value 0.07674
scoring_system epss
scoring_elements 0.91898
published_at 2026-04-08T12:55:00Z
5
value 0.07674
scoring_system epss
scoring_elements 0.91904
published_at 2026-04-09T12:55:00Z
6
value 0.07674
scoring_system epss
scoring_elements 0.91907
published_at 2026-04-12T12:55:00Z
7
value 0.07674
scoring_system epss
scoring_elements 0.91903
published_at 2026-04-13T12:55:00Z
8
value 0.07674
scoring_system epss
scoring_elements 0.91922
published_at 2026-04-16T12:55:00Z
9
value 0.07674
scoring_system epss
scoring_elements 0.91919
published_at 2026-04-18T12:55:00Z
10
value 0.07674
scoring_system epss
scoring_elements 0.91915
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1026942
reference_id 1026942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1026942
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845
reference_id 728845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845
5
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
6
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
7
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
8
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2013-1418
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka4c-q3hq-6fe3
46
url VCID-khdw-3p5j-vya6
vulnerability_id VCID-khdw-3p5j-vya6
summary krb5: overflow when calculating ulog block size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24528
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42933
published_at 2026-04-02T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42916
published_at 2026-04-21T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42948
published_at 2026-04-12T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42983
published_at 2026-04-11T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42931
published_at 2026-04-13T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42991
published_at 2026-04-16T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42978
published_at 2026-04-18T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.4296
published_at 2026-04-09T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42898
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730
reference_id 1094730
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342796
reference_id 2342796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342796
6
reference_url https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
reference_id 78ceba024b64d49612375be4a12d1c066b0bfbd0
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/
url https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
7
reference_url https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final
reference_id krb5-1.21.3-final...krb5-1.22-final
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/
url https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final
8
reference_url https://access.redhat.com/errata/RHSA-2025:1352
reference_id RHSA-2025:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1352
9
reference_url https://access.redhat.com/errata/RHSA-2025:2722
reference_id RHSA-2025:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2722
10
reference_url https://access.redhat.com/errata/RHSA-2025:2789
reference_id RHSA-2025:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2789
11
reference_url https://access.redhat.com/errata/RHSA-2025:7067
reference_id RHSA-2025:7067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7067
12
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8385
13
reference_url https://usn.ubuntu.com/7314-1/
reference_id USN-7314-1
reference_type
scores
url https://usn.ubuntu.com/7314-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4
aliases CVE-2025-24528
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khdw-3p5j-vya6
47
url VCID-ktam-mx9t-jqa2
vulnerability_id VCID-ktam-mx9t-jqa2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9422
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.73987
published_at 2026-04-21T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73896
published_at 2026-04-01T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73906
published_at 2026-04-02T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.7393
published_at 2026-04-04T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73901
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73935
published_at 2026-04-08T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73948
published_at 2026-04-09T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73971
published_at 2026-04-11T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73953
published_at 2026-04-12T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73945
published_at 2026-04-13T12:55:00Z
10
value 0.00794
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-16T12:55:00Z
11
value 0.00794
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9422
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179861
reference_id 1179861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179861
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9422
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktam-mx9t-jqa2
48
url VCID-mjvu-45rb-6kf8
vulnerability_id VCID-mjvu-45rb-6kf8
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
8
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
9
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
10
reference_url http://marc.info/?l=bugtraq&m=130497213107107&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130497213107107&w=2
11
reference_url http://osvdb.org/69610
reference_id
reference_type
scores
url http://osvdb.org/69610
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
reference_id
reference_type
scores
0
value 0.04735
scoring_system epss
scoring_elements 0.89421
published_at 2026-04-18T12:55:00Z
1
value 0.04735
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-21T12:55:00Z
2
value 0.04735
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-01T12:55:00Z
3
value 0.04735
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-02T12:55:00Z
4
value 0.04735
scoring_system epss
scoring_elements 0.89381
published_at 2026-04-04T12:55:00Z
5
value 0.04735
scoring_system epss
scoring_elements 0.89383
published_at 2026-04-07T12:55:00Z
6
value 0.04735
scoring_system epss
scoring_elements 0.894
published_at 2026-04-08T12:55:00Z
7
value 0.04735
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-09T12:55:00Z
8
value 0.04735
scoring_system epss
scoring_elements 0.89411
published_at 2026-04-11T12:55:00Z
9
value 0.04735
scoring_system epss
scoring_elements 0.89409
published_at 2026-04-12T12:55:00Z
10
value 0.04735
scoring_system epss
scoring_elements 0.89404
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
15
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
16
reference_url http://secunia.com/advisories/42420
reference_id
reference_type
scores
url http://secunia.com/advisories/42420
17
reference_url http://secunia.com/advisories/42436
reference_id
reference_type
scores
url http://secunia.com/advisories/42436
18
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
21
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
22
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
23
reference_url http://www.debian.org/security/2010/dsa-2129
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2129
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
26
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2010-0926.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0926.html
29
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
31
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/45118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45118
33
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
34
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
35
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
36
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
37
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
38
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
39
reference_url http://www.vupen.com/english/advisories/2010/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3101
40
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
41
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648734
reference_id 648734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648734
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
reference_id CVE-2010-1323
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
72
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
73
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
74
reference_url https://access.redhat.com/errata/RHSA-2010:0926
reference_id RHSA-2010:0926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0926
75
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-1323
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjvu-45rb-6kf8
49
url VCID-mqs4-crva-ayaz
vulnerability_id VCID-mqs4-crva-ayaz
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
reference_id
reference_type
scores
0
value 0.08988
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-21T12:55:00Z
1
value 0.08988
scoring_system epss
scoring_elements 0.92578
published_at 2026-04-01T12:55:00Z
2
value 0.08988
scoring_system epss
scoring_elements 0.92583
published_at 2026-04-02T12:55:00Z
3
value 0.08988
scoring_system epss
scoring_elements 0.9259
published_at 2026-04-04T12:55:00Z
4
value 0.08988
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-07T12:55:00Z
5
value 0.08988
scoring_system epss
scoring_elements 0.92602
published_at 2026-04-08T12:55:00Z
6
value 0.08988
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-09T12:55:00Z
7
value 0.08988
scoring_system epss
scoring_elements 0.92613
published_at 2026-04-13T12:55:00Z
8
value 0.08988
scoring_system epss
scoring_elements 0.92614
published_at 2026-04-12T12:55:00Z
9
value 0.08988
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-16T12:55:00Z
10
value 0.08988
scoring_system epss
scoring_elements 0.92625
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
6
reference_url http://securityreason.com/securityalert/8070
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8070
7
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
10
reference_url http://www.securityfocus.com/archive/1/516286/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516286/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/46269
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46269
12
reference_url http://www.securitytracker.com/id?1025035
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025035
13
reference_url http://www.vupen.com/english/advisories/2011/0329
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0329
14
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
15
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
16
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664009
reference_id 664009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664009
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
reference_id CVE-2010-4022
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
22
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
23
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
24
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2010-4022
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqs4-crva-ayaz
50
url VCID-n4xu-cnqt-gbgf
vulnerability_id VCID-n4xu-cnqt-gbgf
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1015
reference_id
reference_type
scores
0
value 0.01234
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-18T12:55:00Z
1
value 0.01234
scoring_system epss
scoring_elements 0.79143
published_at 2026-04-01T12:55:00Z
2
value 0.01234
scoring_system epss
scoring_elements 0.7915
published_at 2026-04-02T12:55:00Z
3
value 0.01234
scoring_system epss
scoring_elements 0.79175
published_at 2026-04-04T12:55:00Z
4
value 0.01234
scoring_system epss
scoring_elements 0.7916
published_at 2026-04-07T12:55:00Z
5
value 0.01234
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-08T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79193
published_at 2026-04-09T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79217
published_at 2026-04-21T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.79202
published_at 2026-04-12T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-13T12:55:00Z
10
value 0.01234
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
reference_id 683429
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=838012
reference_id 838012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=838012
6
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
7
reference_url https://access.redhat.com/errata/RHSA-2012:1131
reference_id RHSA-2012:1131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1131
8
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1015
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4xu-cnqt-gbgf
51
url VCID-nguz-sg5j-87db
vulnerability_id VCID-nguz-sg5j-87db
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
1
reference_url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1320
reference_id
reference_type
scores
0
value 0.22068
scoring_system epss
scoring_elements 0.95802
published_at 2026-04-21T12:55:00Z
1
value 0.22068
scoring_system epss
scoring_elements 0.9575
published_at 2026-04-01T12:55:00Z
2
value 0.22068
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-02T12:55:00Z
3
value 0.22068
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-04T12:55:00Z
4
value 0.22068
scoring_system epss
scoring_elements 0.9577
published_at 2026-04-07T12:55:00Z
5
value 0.22068
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-08T12:55:00Z
6
value 0.22068
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-09T12:55:00Z
7
value 0.22068
scoring_system epss
scoring_elements 0.95785
published_at 2026-04-11T12:55:00Z
8
value 0.22068
scoring_system epss
scoring_elements 0.95784
published_at 2026-04-12T12:55:00Z
9
value 0.22068
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-13T12:55:00Z
10
value 0.22068
scoring_system epss
scoring_elements 0.95796
published_at 2026-04-16T12:55:00Z
11
value 0.22068
scoring_system epss
scoring_elements 0.95801
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1320
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320
6
reference_url http://secunia.com/advisories/39656
reference_id
reference_type
scores
url http://secunia.com/advisories/39656
7
reference_url http://secunia.com/advisories/39784
reference_id
reference_type
scores
url http://secunia.com/advisories/39784
8
reference_url http://secunia.com/advisories/40220
reference_id
reference_type
scores
url http://secunia.com/advisories/40220
9
reference_url http://securitytracker.com/id?1023904
reference_id
reference_type
scores
url http://securitytracker.com/id?1023904
10
reference_url http://support.apple.com/kb/HT4188
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4188
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt
12
reference_url http://www.securityfocus.com/archive/1/510843/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510843/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/39599
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39599
14
reference_url http://www.ubuntu.com/usn/USN-940-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-1
15
reference_url http://www.vupen.com/english/advisories/2010/1001
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1001
16
reference_url http://www.vupen.com/english/advisories/2010/1192
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1192
17
reference_url http://www.vupen.com/english/advisories/2010/1481
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1481
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
reference_id 577490
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=581922
reference_id 581922
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=581922
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1320
reference_id CVE-2010-1320
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1320
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt
reference_id CVE-2010-1320;OSVDB-63975
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt
26
reference_url https://www.securityfocus.com/bid/39599/info
reference_id CVE-2010-1320;OSVDB-63975
reference_type exploit
scores
url https://www.securityfocus.com/bid/39599/info
27
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
28
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-1320
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nguz-sg5j-87db
52
url VCID-p65d-bnug-c7fr
vulnerability_id VCID-p65d-bnug-c7fr
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://osvdb.org/69608
reference_id
reference_type
scores
url http://osvdb.org/69608
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
reference_id
reference_type
scores
0
value 0.00535
scoring_system epss
scoring_elements 0.67467
published_at 2026-04-21T12:55:00Z
1
value 0.00535
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-18T12:55:00Z
2
value 0.00535
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-01T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67398
published_at 2026-04-07T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.6742
published_at 2026-04-04T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.6745
published_at 2026-04-08T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.67464
published_at 2026-04-09T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.67486
published_at 2026-04-11T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67473
published_at 2026-04-12T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.6744
published_at 2026-04-13T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.67476
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
11
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
12
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
13
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
17
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/45117
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45117
20
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
21
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
22
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
23
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
24
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
25
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648735
reference_id 648735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648735
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
reference_id CVE-2010-4020
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
35
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-4020
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p65d-bnug-c7fr
53
url VCID-q2tg-s1kk-4bhc
vulnerability_id VCID-q2tg-s1kk-4bhc
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2696
reference_id
reference_type
scores
0
value 0.08283
scoring_system epss
scoring_elements 0.92259
published_at 2026-04-21T12:55:00Z
1
value 0.08283
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-18T12:55:00Z
2
value 0.08283
scoring_system epss
scoring_elements 0.92212
published_at 2026-04-01T12:55:00Z
3
value 0.08283
scoring_system epss
scoring_elements 0.92219
published_at 2026-04-02T12:55:00Z
4
value 0.08283
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-04T12:55:00Z
5
value 0.08283
scoring_system epss
scoring_elements 0.92228
published_at 2026-04-07T12:55:00Z
6
value 0.08283
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-08T12:55:00Z
7
value 0.08283
scoring_system epss
scoring_elements 0.92243
published_at 2026-04-09T12:55:00Z
8
value 0.08283
scoring_system epss
scoring_elements 0.92248
published_at 2026-04-11T12:55:00Z
9
value 0.08283
scoring_system epss
scoring_elements 0.92249
published_at 2026-04-12T12:55:00Z
10
value 0.08283
scoring_system epss
scoring_elements 0.92246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2696
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
11
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
12
reference_url http://www.securityfocus.com/bid/90675
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90675
13
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
14
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275869
reference_id 1275869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275869
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084
reference_id 803084
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2696
reference_id CVE-2015-2696
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-2696
32
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
33
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2696
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2tg-s1kk-4bhc
54
url VCID-qcva-cb6c-wyds
vulnerability_id VCID-qcva-cb6c-wyds
summary krb5: Automatic sec context deletion could lead to double-free
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11462
reference_id
reference_type
scores
0
value 0.01055
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-01T12:55:00Z
1
value 0.01055
scoring_system epss
scoring_elements 0.77621
published_at 2026-04-21T12:55:00Z
2
value 0.01055
scoring_system epss
scoring_elements 0.7758
published_at 2026-04-09T12:55:00Z
3
value 0.01055
scoring_system epss
scoring_elements 0.77607
published_at 2026-04-11T12:55:00Z
4
value 0.01055
scoring_system epss
scoring_elements 0.77591
published_at 2026-04-12T12:55:00Z
5
value 0.01055
scoring_system epss
scoring_elements 0.7759
published_at 2026-04-13T12:55:00Z
6
value 0.01055
scoring_system epss
scoring_elements 0.77628
published_at 2026-04-16T12:55:00Z
7
value 0.01055
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-18T12:55:00Z
8
value 0.01055
scoring_system epss
scoring_elements 0.77533
published_at 2026-04-02T12:55:00Z
9
value 0.01055
scoring_system epss
scoring_elements 0.77559
published_at 2026-04-04T12:55:00Z
10
value 0.01055
scoring_system epss
scoring_elements 0.77541
published_at 2026-04-07T12:55:00Z
11
value 0.01055
scoring_system epss
scoring_elements 0.77571
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11462
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488873
reference_id 1488873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488873
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563
reference_id 873563
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563
9
reference_url https://security.archlinux.org/ASA-201710-8
reference_id ASA-201710-8
reference_type
scores
url https://security.archlinux.org/ASA-201710-8
10
reference_url https://security.archlinux.org/ASA-201710-9
reference_id ASA-201710-9
reference_type
scores
url https://security.archlinux.org/ASA-201710-9
11
reference_url https://security.archlinux.org/AVG-414
reference_id AVG-414
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-414
12
reference_url https://security.archlinux.org/AVG-415
reference_id AVG-415
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-415
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-11462
reference_id CVE-2017-11462
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-11462
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-11462
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qcva-cb6c-wyds
55
url VCID-qdte-3pqp-17at
vulnerability_id VCID-qdte-3pqp-17at
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
8
reference_url http://osvdb.org/69609
reference_id
reference_type
scores
url http://osvdb.org/69609
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
reference_id
reference_type
scores
0
value 0.03499
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-21T12:55:00Z
1
value 0.03499
scoring_system epss
scoring_elements 0.87618
published_at 2026-04-18T12:55:00Z
2
value 0.03499
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-01T12:55:00Z
3
value 0.03499
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-02T12:55:00Z
4
value 0.03499
scoring_system epss
scoring_elements 0.87571
published_at 2026-04-04T12:55:00Z
5
value 0.03499
scoring_system epss
scoring_elements 0.87574
published_at 2026-04-07T12:55:00Z
6
value 0.03499
scoring_system epss
scoring_elements 0.87593
published_at 2026-04-08T12:55:00Z
7
value 0.03499
scoring_system epss
scoring_elements 0.87599
published_at 2026-04-09T12:55:00Z
8
value 0.03499
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-11T12:55:00Z
9
value 0.03499
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-12T12:55:00Z
10
value 0.03499
scoring_system epss
scoring_elements 0.87603
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
12
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
13
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
15
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
16
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
18
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
20
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
21
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/45116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45116
23
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
24
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
26
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
27
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
28
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
29
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648674
reference_id 648674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648674
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
reference_id CVE-2010-1324
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
39
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
40
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
41
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-1324
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdte-3pqp-17at
56
url VCID-qq4w-brbc-8fab
vulnerability_id VCID-qq4w-brbc-8fab
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0846
reference_id
reference_type
scores
0
value 0.50005
scoring_system epss
scoring_elements 0.9783
published_at 2026-04-21T12:55:00Z
1
value 0.50005
scoring_system epss
scoring_elements 0.97819
published_at 2026-04-11T12:55:00Z
2
value 0.50005
scoring_system epss
scoring_elements 0.97821
published_at 2026-04-12T12:55:00Z
3
value 0.50005
scoring_system epss
scoring_elements 0.97823
published_at 2026-04-13T12:55:00Z
4
value 0.50005
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-16T12:55:00Z
5
value 0.50005
scoring_system epss
scoring_elements 0.97832
published_at 2026-04-18T12:55:00Z
6
value 0.50005
scoring_system epss
scoring_elements 0.97817
published_at 2026-04-09T12:55:00Z
7
value 0.56355
scoring_system epss
scoring_elements 0.98101
published_at 2026-04-02T12:55:00Z
8
value 0.56355
scoring_system epss
scoring_elements 0.98104
published_at 2026-04-04T12:55:00Z
9
value 0.56355
scoring_system epss
scoring_elements 0.98105
published_at 2026-04-07T12:55:00Z
10
value 0.56355
scoring_system epss
scoring_elements 0.98109
published_at 2026-04-08T12:55:00Z
11
value 0.56355
scoring_system epss
scoring_elements 0.98097
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491036
reference_id 491036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491036
4
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
5
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
6
reference_url https://access.redhat.com/errata/RHSA-2009:0409
reference_id RHSA-2009:0409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0409
7
reference_url https://access.redhat.com/errata/RHSA-2009:0410
reference_id RHSA-2009:0410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0410
8
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-0846
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qq4w-brbc-8fab
57
url VCID-qzt5-fxf1-huff
vulnerability_id VCID-qzt5-fxf1-huff
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0942.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0942.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2443
reference_id
reference_type
scores
0
value 0.15013
scoring_system epss
scoring_elements 0.94589
published_at 2026-04-21T12:55:00Z
1
value 0.15013
scoring_system epss
scoring_elements 0.9453
published_at 2026-04-01T12:55:00Z
2
value 0.15013
scoring_system epss
scoring_elements 0.94538
published_at 2026-04-02T12:55:00Z
3
value 0.15013
scoring_system epss
scoring_elements 0.94545
published_at 2026-04-04T12:55:00Z
4
value 0.15013
scoring_system epss
scoring_elements 0.94548
published_at 2026-04-07T12:55:00Z
5
value 0.15013
scoring_system epss
scoring_elements 0.94558
published_at 2026-04-08T12:55:00Z
6
value 0.15013
scoring_system epss
scoring_elements 0.94562
published_at 2026-04-09T12:55:00Z
7
value 0.15013
scoring_system epss
scoring_elements 0.94565
published_at 2026-04-11T12:55:00Z
8
value 0.15013
scoring_system epss
scoring_elements 0.94568
published_at 2026-04-13T12:55:00Z
9
value 0.15013
scoring_system epss
scoring_elements 0.94581
published_at 2026-04-16T12:55:00Z
10
value 0.15013
scoring_system epss
scoring_elements 0.94585
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2443
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
10
reference_url https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
11
reference_url http://www.debian.org/security/2013/dsa-2701
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2701
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:166
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:166
13
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267
reference_id 708267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=962531
reference_id 962531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=962531
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-2443
reference_id CVE-2002-2443
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-2443
40
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
41
reference_url https://access.redhat.com/errata/RHSA-2013:0942
reference_id RHSA-2013:0942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0942
42
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2002-2443
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzt5-fxf1-huff
58
url VCID-r1jf-pd4n-53dr
vulnerability_id VCID-r1jf-pd4n-53dr
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3295
reference_id
reference_type
scores
0
value 0.02737
scoring_system epss
scoring_elements 0.85907
published_at 2026-04-01T12:55:00Z
1
value 0.02737
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-02T12:55:00Z
2
value 0.02737
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-04T12:55:00Z
3
value 0.02737
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-07T12:55:00Z
4
value 0.02737
scoring_system epss
scoring_elements 0.85956
published_at 2026-04-08T12:55:00Z
5
value 0.02737
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-09T12:55:00Z
6
value 0.02737
scoring_system epss
scoring_elements 0.85981
published_at 2026-04-11T12:55:00Z
7
value 0.02737
scoring_system epss
scoring_elements 0.85979
published_at 2026-04-12T12:55:00Z
8
value 0.02737
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-13T12:55:00Z
9
value 0.02737
scoring_system epss
scoring_elements 0.85992
published_at 2026-04-16T12:55:00Z
10
value 0.02737
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-18T12:55:00Z
11
value 0.02737
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=545002
reference_id 545002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=545002
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://usn.ubuntu.com/879-1/
reference_id USN-879-1
reference_type
scores
url https://usn.ubuntu.com/879-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-3295
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1jf-pd4n-53dr
59
url VCID-r1wa-3gtw-1qey
vulnerability_id VCID-r1wa-3gtw-1qey
summary krb5: Buffer overflow in get_matching_data()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15088
reference_id
reference_type
scores
0
value 0.03704
scoring_system epss
scoring_elements 0.87972
published_at 2026-04-21T12:55:00Z
1
value 0.03704
scoring_system epss
scoring_elements 0.8793
published_at 2026-04-07T12:55:00Z
2
value 0.03704
scoring_system epss
scoring_elements 0.8795
published_at 2026-04-08T12:55:00Z
3
value 0.03704
scoring_system epss
scoring_elements 0.87957
published_at 2026-04-09T12:55:00Z
4
value 0.03704
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-11T12:55:00Z
5
value 0.03704
scoring_system epss
scoring_elements 0.8796
published_at 2026-04-12T12:55:00Z
6
value 0.03704
scoring_system epss
scoring_elements 0.87959
published_at 2026-04-13T12:55:00Z
7
value 0.03704
scoring_system epss
scoring_elements 0.87973
published_at 2026-04-18T12:55:00Z
8
value 0.0399
scoring_system epss
scoring_elements 0.88356
published_at 2026-04-01T12:55:00Z
9
value 0.0399
scoring_system epss
scoring_elements 0.88364
published_at 2026-04-02T12:55:00Z
10
value 0.0399
scoring_system epss
scoring_elements 0.88379
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15088
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
6
reference_url https://github.com/krb5/krb5/pull/707
reference_id
reference_type
scores
url https://github.com/krb5/krb5/pull/707
7
reference_url http://www.securityfocus.com/bid/101594
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101594
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504045
reference_id 1504045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504045
9
reference_url https://security.archlinux.org/AVG-505
reference_id AVG-505
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-505
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15088
reference_id CVE-2017-15088
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15088
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-15088
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1wa-3gtw-1qey
60
url VCID-rmt9-dmmb-kkec
vulnerability_id VCID-rmt9-dmmb-kkec
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4341
reference_id
reference_type
scores
0
value 0.14451
scoring_system epss
scoring_elements 0.94458
published_at 2026-04-21T12:55:00Z
1
value 0.14451
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-18T12:55:00Z
2
value 0.14451
scoring_system epss
scoring_elements 0.94396
published_at 2026-04-01T12:55:00Z
3
value 0.14451
scoring_system epss
scoring_elements 0.94403
published_at 2026-04-02T12:55:00Z
4
value 0.14451
scoring_system epss
scoring_elements 0.94415
published_at 2026-04-04T12:55:00Z
5
value 0.14451
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-07T12:55:00Z
6
value 0.14451
scoring_system epss
scoring_elements 0.94427
published_at 2026-04-08T12:55:00Z
7
value 0.14451
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-09T12:55:00Z
8
value 0.14451
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-11T12:55:00Z
9
value 0.14451
scoring_system epss
scoring_elements 0.94435
published_at 2026-04-13T12:55:00Z
10
value 0.14451
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4341
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94904
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94904
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
19
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
21
reference_url http://www.securityfocus.com/bid/68909
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68909
22
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1116180
reference_id 1116180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1116180
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624
reference_id 753624
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4341
reference_id CVE-2014-4341
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4341
48
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
49
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
50
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
51
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
52
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4341
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmt9-dmmb-kkec
61
url VCID-rpxk-f19y-87dq
vulnerability_id VCID-rpxk-f19y-87dq
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2695
reference_id
reference_type
scores
0
value 0.0539
scoring_system epss
scoring_elements 0.90135
published_at 2026-04-21T12:55:00Z
1
value 0.0539
scoring_system epss
scoring_elements 0.90138
published_at 2026-04-18T12:55:00Z
2
value 0.0539
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-01T12:55:00Z
3
value 0.0539
scoring_system epss
scoring_elements 0.90081
published_at 2026-04-02T12:55:00Z
4
value 0.0539
scoring_system epss
scoring_elements 0.90093
published_at 2026-04-04T12:55:00Z
5
value 0.0539
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-07T12:55:00Z
6
value 0.0539
scoring_system epss
scoring_elements 0.90113
published_at 2026-04-08T12:55:00Z
7
value 0.0539
scoring_system epss
scoring_elements 0.90119
published_at 2026-04-09T12:55:00Z
8
value 0.0539
scoring_system epss
scoring_elements 0.90128
published_at 2026-04-11T12:55:00Z
9
value 0.0539
scoring_system epss
scoring_elements 0.90126
published_at 2026-04-12T12:55:00Z
10
value 0.0539
scoring_system epss
scoring_elements 0.90121
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
12
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
13
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
14
reference_url http://www.securityfocus.com/bid/90687
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90687
15
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
16
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275871
reference_id 1275871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275871
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083
reference_id 803083
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2695
reference_id CVE-2015-2695
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-2695
41
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
42
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2695
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpxk-f19y-87dq
62
url VCID-sgnn-emh7-kqgh
vulnerability_id VCID-sgnn-emh7-kqgh
summary security update
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0493.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0493.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8631
reference_id
reference_type
scores
0
value 0.0221
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-21T12:55:00Z
1
value 0.0221
scoring_system epss
scoring_elements 0.84478
published_at 2026-04-16T12:55:00Z
2
value 0.0221
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-18T12:55:00Z
3
value 0.0221
scoring_system epss
scoring_elements 0.84384
published_at 2026-04-01T12:55:00Z
4
value 0.0221
scoring_system epss
scoring_elements 0.84399
published_at 2026-04-02T12:55:00Z
5
value 0.0221
scoring_system epss
scoring_elements 0.84419
published_at 2026-04-04T12:55:00Z
6
value 0.0221
scoring_system epss
scoring_elements 0.84422
published_at 2026-04-07T12:55:00Z
7
value 0.0221
scoring_system epss
scoring_elements 0.84443
published_at 2026-04-08T12:55:00Z
8
value 0.0221
scoring_system epss
scoring_elements 0.84448
published_at 2026-04-09T12:55:00Z
9
value 0.0221
scoring_system epss
scoring_elements 0.84467
published_at 2026-04-11T12:55:00Z
10
value 0.0221
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-12T12:55:00Z
11
value 0.0221
scoring_system epss
scoring_elements 0.84456
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8631
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
11
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
13
reference_url http://www.securitytracker.com/id/1034916
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034916
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302642
reference_id 1302642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302642
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126
reference_id 813126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8631
reference_id CVE-2015-8631
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8631
46
reference_url https://access.redhat.com/errata/RHSA-2016:0493
reference_id RHSA-2016:0493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0493
47
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8631
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgnn-emh7-kqgh
63
url VCID-sjw9-kv44-8bgv
vulnerability_id VCID-sjw9-kv44-8bgv
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
reference_id
reference_type
scores
0
value 0.05459
scoring_system epss
scoring_elements 0.90147
published_at 2026-04-01T12:55:00Z
1
value 0.05459
scoring_system epss
scoring_elements 0.9015
published_at 2026-04-02T12:55:00Z
2
value 0.05459
scoring_system epss
scoring_elements 0.90162
published_at 2026-04-04T12:55:00Z
3
value 0.05459
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-07T12:55:00Z
4
value 0.05459
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-08T12:55:00Z
5
value 0.05459
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-09T12:55:00Z
6
value 0.05459
scoring_system epss
scoring_elements 0.90197
published_at 2026-04-11T12:55:00Z
7
value 0.05459
scoring_system epss
scoring_elements 0.90196
published_at 2026-04-12T12:55:00Z
8
value 0.05459
scoring_system epss
scoring_elements 0.90191
published_at 2026-04-13T12:55:00Z
9
value 0.05459
scoring_system epss
scoring_elements 0.90209
published_at 2026-04-18T12:55:00Z
10
value 0.05459
scoring_system epss
scoring_elements 0.90206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1528
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjw9-kv44-8bgv
64
url VCID-tsuu-f1qk-jygu
vulnerability_id VCID-tsuu-f1qk-jygu
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1417
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67633
published_at 2026-04-01T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67669
published_at 2026-04-02T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.6769
published_at 2026-04-04T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-07T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67722
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67736
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.6776
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67745
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67712
published_at 2026-04-13T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67747
published_at 2026-04-16T12:55:00Z
10
value 0.00543
scoring_system epss
scoring_elements 0.67741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030743
reference_id 1030743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030743
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085
reference_id 730085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085
5
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2013-1417
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsuu-f1qk-jygu
65
url VCID-u9bx-kfz1-nbcq
vulnerability_id VCID-u9bx-kfz1-nbcq
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9421
reference_id
reference_type
scores
0
value 0.05356
scoring_system epss
scoring_elements 0.90094
published_at 2026-04-21T12:55:00Z
1
value 0.05356
scoring_system epss
scoring_elements 0.90038
published_at 2026-04-01T12:55:00Z
2
value 0.05356
scoring_system epss
scoring_elements 0.90041
published_at 2026-04-02T12:55:00Z
3
value 0.05356
scoring_system epss
scoring_elements 0.90052
published_at 2026-04-04T12:55:00Z
4
value 0.05356
scoring_system epss
scoring_elements 0.90057
published_at 2026-04-07T12:55:00Z
5
value 0.05356
scoring_system epss
scoring_elements 0.90072
published_at 2026-04-08T12:55:00Z
6
value 0.05356
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-09T12:55:00Z
7
value 0.05356
scoring_system epss
scoring_elements 0.90087
published_at 2026-04-11T12:55:00Z
8
value 0.05356
scoring_system epss
scoring_elements 0.90085
published_at 2026-04-12T12:55:00Z
9
value 0.05356
scoring_system epss
scoring_elements 0.90079
published_at 2026-04-13T12:55:00Z
10
value 0.05356
scoring_system epss
scoring_elements 0.90096
published_at 2026-04-16T12:55:00Z
11
value 0.05356
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179857
reference_id 1179857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179857
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9421
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bx-kfz1-nbcq
66
url VCID-unvx-tsxw-abbw
vulnerability_id VCID-unvx-tsxw-abbw
summary
A boundary error in Heimdal could result in execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4862
reference_id
reference_type
scores
0
value 0.92585
scoring_system epss
scoring_elements 0.9974
published_at 2026-04-04T12:55:00Z
1
value 0.92585
scoring_system epss
scoring_elements 0.99742
published_at 2026-04-13T12:55:00Z
2
value 0.92585
scoring_system epss
scoring_elements 0.99743
published_at 2026-04-16T12:55:00Z
3
value 0.92585
scoring_system epss
scoring_elements 0.99744
published_at 2026-04-18T12:55:00Z
4
value 0.92585
scoring_system epss
scoring_elements 0.99745
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=770325
reference_id 770325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=770325
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb
7
reference_url https://security.gentoo.org/glsa/201201-14
reference_id GLSA-201201-14
reference_type
scores
url https://security.gentoo.org/glsa/201201-14
8
reference_url https://security.gentoo.org/glsa/201202-05
reference_id GLSA-201202-05
reference_type
scores
url https://security.gentoo.org/glsa/201202-05
9
reference_url https://access.redhat.com/errata/RHSA-2011:1851
reference_id RHSA-2011:1851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1851
10
reference_url https://access.redhat.com/errata/RHSA-2011:1852
reference_id RHSA-2011:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1852
11
reference_url https://access.redhat.com/errata/RHSA-2011:1853
reference_id RHSA-2011:1853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1853
12
reference_url https://access.redhat.com/errata/RHSA-2011:1854
reference_id RHSA-2011:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1854
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2011-4862
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw
67
url VCID-v61z-w8nz-87bv
vulnerability_id VCID-v61z-w8nz-87bv
summary
Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0845.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0845
reference_id
reference_type
scores
0
value 0.19309
scoring_system epss
scoring_elements 0.95384
published_at 2026-04-21T12:55:00Z
1
value 0.19309
scoring_system epss
scoring_elements 0.95333
published_at 2026-04-01T12:55:00Z
2
value 0.19309
scoring_system epss
scoring_elements 0.95343
published_at 2026-04-02T12:55:00Z
3
value 0.19309
scoring_system epss
scoring_elements 0.95349
published_at 2026-04-04T12:55:00Z
4
value 0.19309
scoring_system epss
scoring_elements 0.95354
published_at 2026-04-07T12:55:00Z
5
value 0.19309
scoring_system epss
scoring_elements 0.95361
published_at 2026-04-08T12:55:00Z
6
value 0.19309
scoring_system epss
scoring_elements 0.95364
published_at 2026-04-09T12:55:00Z
7
value 0.19309
scoring_system epss
scoring_elements 0.95368
published_at 2026-04-12T12:55:00Z
8
value 0.19309
scoring_system epss
scoring_elements 0.9537
published_at 2026-04-13T12:55:00Z
9
value 0.19309
scoring_system epss
scoring_elements 0.95377
published_at 2026-04-16T12:55:00Z
10
value 0.19309
scoring_system epss
scoring_elements 0.95381
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0845
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
5
reference_url http://secunia.com/advisories/34347
reference_id
reference_type
scores
url http://secunia.com/advisories/34347
6
reference_url http://secunia.com/advisories/34594
reference_id
reference_type
scores
url http://secunia.com/advisories/34594
7
reference_url http://secunia.com/advisories/34617
reference_id
reference_type
scores
url http://secunia.com/advisories/34617
8
reference_url http://secunia.com/advisories/34622
reference_id
reference_type
scores
url http://secunia.com/advisories/34622
9
reference_url http://secunia.com/advisories/34628
reference_id
reference_type
scores
url http://secunia.com/advisories/34628
10
reference_url http://secunia.com/advisories/34630
reference_id
reference_type
scores
url http://secunia.com/advisories/34630
11
reference_url http://secunia.com/advisories/34637
reference_id
reference_type
scores
url http://secunia.com/advisories/34637
12
reference_url http://secunia.com/advisories/34640
reference_id
reference_type
scores
url http://secunia.com/advisories/34640
13
reference_url http://secunia.com/advisories/34734
reference_id
reference_type
scores
url http://secunia.com/advisories/34734
14
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
15
reference_url http://security.gentoo.org/glsa/glsa-200904-09.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200904-09.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49448
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49448
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449
19
reference_url http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084
reference_id
reference_type
scores
url http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&r2=22084
20
reference_url http://src.mit.edu/fisheye/changelog/krb5/?cs=22084
reference_id
reference_type
scores
url http://src.mit.edu/fisheye/changelog/krb5/?cs=22084
21
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
22
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
23
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm
24
reference_url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
reference_id
reference_type
scores
url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
25
reference_url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
reference_id
reference_type
scores
url http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
26
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
27
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
28
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt
29
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0058
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0058
30
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
31
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21396120
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21396120
32
reference_url http://www.kb.cert.org/vuls/id/662091
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/662091
33
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:082
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:082
34
reference_url http://www.redhat.com/support/errata/RHSA-2009-0408.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0408.html
35
reference_url http://www.securityfocus.com/archive/1/502526/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502526/100/0/threaded
36
reference_url http://www.securityfocus.com/archive/1/502546/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502546/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/34257
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34257
38
reference_url http://www.securitytracker.com/id?1021867
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021867
39
reference_url http://www.ubuntu.com/usn/usn-755-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-755-1
40
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
41
reference_url http://www.vupen.com/english/advisories/2009/0847
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0847
42
reference_url http://www.vupen.com/english/advisories/2009/0976
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0976
43
reference_url http://www.vupen.com/english/advisories/2009/1057
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1057
44
reference_url http://www.vupen.com/english/advisories/2009/1106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1106
45
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
46
reference_url http://www.vupen.com/english/advisories/2009/2248
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/2248
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490634
reference_id 490634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490634
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0845
reference_id CVE-2009-0845
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0845
57
reference_url https://security.gentoo.org/glsa/200904-09
reference_id GLSA-200904-09
reference_type
scores
url https://security.gentoo.org/glsa/200904-09
58
reference_url https://access.redhat.com/errata/RHSA-2009:0408
reference_id RHSA-2009:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0408
59
reference_url https://usn.ubuntu.com/755-1/
reference_id USN-755-1
reference_type
scores
url https://usn.ubuntu.com/755-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2009-0845
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v61z-w8nz-87bv
68
url VCID-vr9b-gwxs-fqgg
vulnerability_id VCID-vr9b-gwxs-fqgg
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
3
reference_url http://linux.oracle.com/errata/ELSA-2014-1255.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-1255.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1255.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1255.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4345
reference_id
reference_type
scores
0
value 0.11304
scoring_system epss
scoring_elements 0.9356
published_at 2026-04-21T12:55:00Z
1
value 0.11304
scoring_system epss
scoring_elements 0.93553
published_at 2026-04-18T12:55:00Z
2
value 0.11304
scoring_system epss
scoring_elements 0.93495
published_at 2026-04-01T12:55:00Z
3
value 0.11304
scoring_system epss
scoring_elements 0.93504
published_at 2026-04-02T12:55:00Z
4
value 0.11304
scoring_system epss
scoring_elements 0.93512
published_at 2026-04-07T12:55:00Z
5
value 0.11304
scoring_system epss
scoring_elements 0.9352
published_at 2026-04-08T12:55:00Z
6
value 0.11304
scoring_system epss
scoring_elements 0.93523
published_at 2026-04-09T12:55:00Z
7
value 0.11304
scoring_system epss
scoring_elements 0.93528
published_at 2026-04-13T12:55:00Z
8
value 0.11304
scoring_system epss
scoring_elements 0.93547
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4345
12
reference_url https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
18
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
19
reference_url http://secunia.com/advisories/59415
reference_id
reference_type
scores
url http://secunia.com/advisories/59415
20
reference_url http://secunia.com/advisories/59993
reference_id
reference_type
scores
url http://secunia.com/advisories/59993
21
reference_url http://secunia.com/advisories/60535
reference_id
reference_type
scores
url http://secunia.com/advisories/60535
22
reference_url http://secunia.com/advisories/60776
reference_id
reference_type
scores
url http://secunia.com/advisories/60776
23
reference_url http://secunia.com/advisories/61314
reference_id
reference_type
scores
url http://secunia.com/advisories/61314
24
reference_url http://secunia.com/advisories/61353
reference_id
reference_type
scores
url http://secunia.com/advisories/61353
25
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95212
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95212
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
29
reference_url https://github.com/krb5/krb5/pull/181
reference_id
reference_type
scores
url https://github.com/krb5/krb5/pull/181
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
31
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
34
reference_url http://www.osvdb.org/109908
reference_id
reference_type
scores
url http://www.osvdb.org/109908
35
reference_url http://www.securityfocus.com/bid/69168
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69168
36
reference_url http://www.securitytracker.com/id/1030705
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030705
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1128157
reference_id 1128157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1128157
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416
reference_id 757416
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4345
reference_id CVE-2014-4345
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4345
70
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
71
reference_url https://access.redhat.com/errata/RHSA-2014:1255
reference_id RHSA-2014:1255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1255
72
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
73
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
74
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4345
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9b-gwxs-fqgg
69
url VCID-w6yc-w573-vbhy
vulnerability_id VCID-w6yc-w573-vbhy
summary krb5: GSS message token handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37370
reference_id
reference_type
scores
0
value 0.00545
scoring_system epss
scoring_elements 0.67803
published_at 2026-04-21T12:55:00Z
1
value 0.00545
scoring_system epss
scoring_elements 0.67783
published_at 2026-04-08T12:55:00Z
2
value 0.00545
scoring_system epss
scoring_elements 0.67797
published_at 2026-04-09T12:55:00Z
3
value 0.00545
scoring_system epss
scoring_elements 0.67821
published_at 2026-04-18T12:55:00Z
4
value 0.00545
scoring_system epss
scoring_elements 0.67807
published_at 2026-04-12T12:55:00Z
5
value 0.00545
scoring_system epss
scoring_elements 0.67773
published_at 2026-04-13T12:55:00Z
6
value 0.00545
scoring_system epss
scoring_elements 0.67809
published_at 2026-04-16T12:55:00Z
7
value 0.00545
scoring_system epss
scoring_elements 0.67731
published_at 2026-04-02T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-04T12:55:00Z
9
value 0.00545
scoring_system epss
scoring_elements 0.67732
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2294677
reference_id 2294677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2294677
6
reference_url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_id 55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/
url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
7
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/
url https://web.mit.edu/kerberos/www/advisories/
8
reference_url https://security.archlinux.org/AVG-2856
reference_id AVG-2856
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2856
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:4734
reference_id RHSA-2024:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4734
12
reference_url https://access.redhat.com/errata/RHSA-2024:4743
reference_id RHSA-2024:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4743
13
reference_url https://access.redhat.com/errata/RHSA-2024:5076
reference_id RHSA-2024:5076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5076
14
reference_url https://access.redhat.com/errata/RHSA-2024:5312
reference_id RHSA-2024:5312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5312
15
reference_url https://access.redhat.com/errata/RHSA-2024:5316
reference_id RHSA-2024:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5316
16
reference_url https://access.redhat.com/errata/RHSA-2024:5625
reference_id RHSA-2024:5625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5625
17
reference_url https://access.redhat.com/errata/RHSA-2024:5630
reference_id RHSA-2024:5630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5630
18
reference_url https://access.redhat.com/errata/RHSA-2024:5643
reference_id RHSA-2024:5643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5643
19
reference_url https://access.redhat.com/errata/RHSA-2024:5884
reference_id RHSA-2024:5884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5884
20
reference_url https://access.redhat.com/errata/RHSA-2024:6166
reference_id RHSA-2024:6166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6166
21
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
22
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
23
reference_url https://usn.ubuntu.com/6947-1/
reference_id USN-6947-1
reference_type
scores
url https://usn.ubuntu.com/6947-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2024-37370
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6yc-w573-vbhy
70
url VCID-wng4-f8sk-kqg9
vulnerability_id VCID-wng4-f8sk-kqg9
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
reference_id
reference_type
scores
0
value 0.00934
scoring_system epss
scoring_elements 0.7609
published_at 2026-04-01T12:55:00Z
1
value 0.00934
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-02T12:55:00Z
2
value 0.00934
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-04T12:55:00Z
3
value 0.00934
scoring_system epss
scoring_elements 0.76104
published_at 2026-04-07T12:55:00Z
4
value 0.00934
scoring_system epss
scoring_elements 0.76137
published_at 2026-04-08T12:55:00Z
5
value 0.00934
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-09T12:55:00Z
6
value 0.00934
scoring_system epss
scoring_elements 0.76176
published_at 2026-04-11T12:55:00Z
7
value 0.00934
scoring_system epss
scoring_elements 0.76152
published_at 2026-04-12T12:55:00Z
8
value 0.00934
scoring_system epss
scoring_elements 0.76149
published_at 2026-04-13T12:55:00Z
9
value 0.00934
scoring_system epss
scoring_elements 0.7619
published_at 2026-04-16T12:55:00Z
10
value 0.00934
scoring_system epss
scoring_elements 0.76194
published_at 2026-04-18T12:55:00Z
11
value 0.00934
scoring_system epss
scoring_elements 0.76177
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=753748
reference_id 753748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=753748
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2011:1790
reference_id RHSA-2011:1790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1790
6
reference_url https://usn.ubuntu.com/1290-1/
reference_id USN-1290-1
reference_type
scores
url https://usn.ubuntu.com/1290-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1530
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wng4-f8sk-kqg9
71
url VCID-yuur-7md8-skcv
vulnerability_id VCID-yuur-7md8-skcv
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4344
reference_id
reference_type
scores
0
value 0.0527
scoring_system epss
scoring_elements 0.90011
published_at 2026-04-21T12:55:00Z
1
value 0.0527
scoring_system epss
scoring_elements 0.89956
published_at 2026-04-01T12:55:00Z
2
value 0.0527
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-02T12:55:00Z
3
value 0.0527
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-04T12:55:00Z
4
value 0.0527
scoring_system epss
scoring_elements 0.89978
published_at 2026-04-07T12:55:00Z
5
value 0.0527
scoring_system epss
scoring_elements 0.89993
published_at 2026-04-08T12:55:00Z
6
value 0.0527
scoring_system epss
scoring_elements 0.89999
published_at 2026-04-09T12:55:00Z
7
value 0.0527
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-11T12:55:00Z
8
value 0.0527
scoring_system epss
scoring_elements 0.90005
published_at 2026-04-12T12:55:00Z
9
value 0.0527
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-13T12:55:00Z
10
value 0.0527
scoring_system epss
scoring_elements 0.90013
published_at 2026-04-16T12:55:00Z
11
value 0.0527
scoring_system epss
scoring_elements 0.90014
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4344
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://secunia.com/advisories/61051
reference_id
reference_type
scores
url http://secunia.com/advisories/61051
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95210
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95210
17
reference_url https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
18
reference_url https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
19
reference_url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
reference_id
reference_type
scores
url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
20
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
22
reference_url http://www.osvdb.org/109389
reference_id
reference_type
scores
url http://www.osvdb.org/109389
23
reference_url http://www.securityfocus.com/bid/69160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69160
24
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121877
reference_id 1121877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121877
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521
reference_id 755521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4344
reference_id CVE-2014-4344
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4344
46
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
47
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
48
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
49
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4344
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yuur-7md8-skcv
72
url VCID-yw2r-vw2q-vffp
vulnerability_id VCID-yw2r-vw2q-vffp
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
reference_id
reference_type
scores
0
value 0.02376
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-01T12:55:00Z
1
value 0.02376
scoring_system epss
scoring_elements 0.84913
published_at 2026-04-02T12:55:00Z
2
value 0.02376
scoring_system epss
scoring_elements 0.84931
published_at 2026-04-04T12:55:00Z
3
value 0.02376
scoring_system epss
scoring_elements 0.84935
published_at 2026-04-07T12:55:00Z
4
value 0.02376
scoring_system epss
scoring_elements 0.84958
published_at 2026-04-08T12:55:00Z
5
value 0.02376
scoring_system epss
scoring_elements 0.84965
published_at 2026-04-09T12:55:00Z
6
value 0.02376
scoring_system epss
scoring_elements 0.84981
published_at 2026-04-11T12:55:00Z
7
value 0.02376
scoring_system epss
scoring_elements 0.84979
published_at 2026-04-12T12:55:00Z
8
value 0.02376
scoring_system epss
scoring_elements 0.84975
published_at 2026-04-13T12:55:00Z
9
value 0.02376
scoring_system epss
scoring_elements 0.84996
published_at 2026-04-16T12:55:00Z
10
value 0.02376
scoring_system epss
scoring_elements 0.84998
published_at 2026-04-18T12:55:00Z
11
value 0.02376
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1529
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw2r-vw2q-vffp
73
url VCID-z6ca-snvn-jyh9
vulnerability_id VCID-z6ca-snvn-jyh9
summary krb5: null pointer dereference in kadmin
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2591.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3119
reference_id
reference_type
scores
0
value 0.0915
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-21T12:55:00Z
1
value 0.0915
scoring_system epss
scoring_elements 0.92697
published_at 2026-04-18T12:55:00Z
2
value 0.0915
scoring_system epss
scoring_elements 0.9265
published_at 2026-04-01T12:55:00Z
3
value 0.0915
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-02T12:55:00Z
4
value 0.0915
scoring_system epss
scoring_elements 0.92664
published_at 2026-04-07T12:55:00Z
5
value 0.0915
scoring_system epss
scoring_elements 0.92674
published_at 2026-04-08T12:55:00Z
6
value 0.0915
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-09T12:55:00Z
7
value 0.0915
scoring_system epss
scoring_elements 0.92684
published_at 2026-04-12T12:55:00Z
8
value 0.0915
scoring_system epss
scoring_elements 0.92683
published_at 2026-04-13T12:55:00Z
9
value 0.0915
scoring_system epss
scoring_elements 0.92698
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3119
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
6
reference_url https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
8
reference_url http://www.securityfocus.com/bid/85392
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85392
9
reference_url http://www.securitytracker.com/id/1035399
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035399
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1319616
reference_id 1319616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1319616
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468
reference_id 819468
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3119
reference_id CVE-2016-3119
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3119
89
reference_url https://access.redhat.com/errata/RHSA-2016:2591
reference_id RHSA-2016:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2591
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2016-3119
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ca-snvn-jyh9
74
url VCID-zm7m-94dv-3bav
vulnerability_id VCID-zm7m-94dv-3bav
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
4
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
5
reference_url http://osvdb.org/69607
reference_id
reference_type
scores
url http://osvdb.org/69607
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4021
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-21T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64482
published_at 2026-04-01T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64535
published_at 2026-04-02T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64564
published_at 2026-04-04T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-07T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-08T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64587
published_at 2026-04-09T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64604
published_at 2026-04-11T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64591
published_at 2026-04-12T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64563
published_at 2026-04-13T12:55:00Z
10
value 0.0047
scoring_system epss
scoring_elements 0.64597
published_at 2026-04-16T12:55:00Z
11
value 0.0047
scoring_system epss
scoring_elements 0.64609
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4021
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021
9
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
12
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
13
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/45122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45122
15
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
16
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
18
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
19
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648736
reference_id 648736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648736
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4021
reference_id CVE-2010-4021
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4021
23
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
24
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-4xpe-hb37-5qdm
5
vulnerability VCID-51sv-1nva-eqey
6
vulnerability VCID-5np7-5bb3-wbfx
7
vulnerability VCID-5s5f-d1ue-gfda
8
vulnerability VCID-5txn-a4x1-nbbe
9
vulnerability VCID-5z7g-r4bh-2qb1
10
vulnerability VCID-6fgr-qbwj-bqf5
11
vulnerability VCID-6het-dg8q-7fcj
12
vulnerability VCID-81qw-myh7-pbdj
13
vulnerability VCID-8rxc-tf1r-wqgm
14
vulnerability VCID-8vzp-yn2u-1ugd
15
vulnerability VCID-8yk4-du7p-eue4
16
vulnerability VCID-97k8-xbsv-87da
17
vulnerability VCID-985p-gnv3-mfd8
18
vulnerability VCID-9d6t-z5dr-yqgy
19
vulnerability VCID-9hyk-mdvc-1baq
20
vulnerability VCID-a9bp-26kx-p7cb
21
vulnerability VCID-ahrt-vcg3-tbc2
22
vulnerability VCID-bdbh-trh7-8fd6
23
vulnerability VCID-bnpa-8svd-jyct
24
vulnerability VCID-bwpn-qxzd-43g8
25
vulnerability VCID-caxe-5ejt-ffgy
26
vulnerability VCID-d1a1-yfu1-kuaz
27
vulnerability VCID-dj1x-1chn-bbhz
28
vulnerability VCID-dv1m-kz1r-8udu
29
vulnerability VCID-dzr3-ncxx-jkck
30
vulnerability VCID-e81a-vujj-yfcs
31
vulnerability VCID-fd9s-vn5s-gud6
32
vulnerability VCID-fg2w-sjkb-ebgb
33
vulnerability VCID-h9q8-x3n3-6qdn
34
vulnerability VCID-j6tv-fz95-3kb8
35
vulnerability VCID-jask-8b2h-p3h8
36
vulnerability VCID-ka4c-q3hq-6fe3
37
vulnerability VCID-khdw-3p5j-vya6
38
vulnerability VCID-ktam-mx9t-jqa2
39
vulnerability VCID-mqs4-crva-ayaz
40
vulnerability VCID-n4xu-cnqt-gbgf
41
vulnerability VCID-q2tg-s1kk-4bhc
42
vulnerability VCID-qcva-cb6c-wyds
43
vulnerability VCID-qzt5-fxf1-huff
44
vulnerability VCID-r1wa-3gtw-1qey
45
vulnerability VCID-rmt9-dmmb-kkec
46
vulnerability VCID-rpxk-f19y-87dq
47
vulnerability VCID-sgnn-emh7-kqgh
48
vulnerability VCID-sjw9-kv44-8bgv
49
vulnerability VCID-tsuu-f1qk-jygu
50
vulnerability VCID-u9bx-kfz1-nbcq
51
vulnerability VCID-vr9b-gwxs-fqgg
52
vulnerability VCID-w6yc-w573-vbhy
53
vulnerability VCID-wng4-f8sk-kqg9
54
vulnerability VCID-yuur-7md8-skcv
55
vulnerability VCID-yw2r-vw2q-vffp
56
vulnerability VCID-z6ca-snvn-jyh9
57
vulnerability VCID-zw66-w86u-cuge
58
vulnerability VCID-zx87-dep4-8bg2
59
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze7
aliases CVE-2010-4021
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zm7m-94dv-3bav
75
url VCID-zw66-w86u-cuge
vulnerability_id VCID-zw66-w86u-cuge
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37750
reference_id
reference_type
scores
0
value 0.00716
scoring_system epss
scoring_elements 0.72328
published_at 2026-04-07T12:55:00Z
1
value 0.00716
scoring_system epss
scoring_elements 0.72413
published_at 2026-04-21T12:55:00Z
2
value 0.00716
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-16T12:55:00Z
3
value 0.00716
scoring_system epss
scoring_elements 0.72425
published_at 2026-04-18T12:55:00Z
4
value 0.00716
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-02T12:55:00Z
5
value 0.00716
scoring_system epss
scoring_elements 0.72351
published_at 2026-04-04T12:55:00Z
6
value 0.00716
scoring_system epss
scoring_elements 0.72367
published_at 2026-04-08T12:55:00Z
7
value 0.00716
scoring_system epss
scoring_elements 0.7238
published_at 2026-04-09T12:55:00Z
8
value 0.00716
scoring_system epss
scoring_elements 0.72402
published_at 2026-04-11T12:55:00Z
9
value 0.00716
scoring_system epss
scoring_elements 0.72386
published_at 2026-04-12T12:55:00Z
10
value 0.00716
scoring_system epss
scoring_elements 0.72374
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1996834
reference_id 1996834
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1996834
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607
reference_id 992607
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607
6
reference_url https://security.archlinux.org/AVG-2312
reference_id AVG-2312
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2312
7
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
8
reference_url https://access.redhat.com/errata/RHSA-2021:3576
reference_id RHSA-2021:3576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3576
9
reference_url https://access.redhat.com/errata/RHSA-2021:4788
reference_id RHSA-2021:4788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4788
10
reference_url https://usn.ubuntu.com/5959-1/
reference_id USN-5959-1
reference_type
scores
url https://usn.ubuntu.com/5959-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2021-37750
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zw66-w86u-cuge
76
url VCID-zx87-dep4-8bg2
vulnerability_id VCID-zx87-dep4-8bg2
summary krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5710
reference_id
reference_type
scores
0
value 0.00563
scoring_system epss
scoring_elements 0.68308
published_at 2026-04-01T12:55:00Z
1
value 0.00563
scoring_system epss
scoring_elements 0.68328
published_at 2026-04-02T12:55:00Z
2
value 0.00563
scoring_system epss
scoring_elements 0.68347
published_at 2026-04-04T12:55:00Z
3
value 0.00563
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-07T12:55:00Z
4
value 0.00563
scoring_system epss
scoring_elements 0.68375
published_at 2026-04-08T12:55:00Z
5
value 0.00563
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-09T12:55:00Z
6
value 0.00563
scoring_system epss
scoring_elements 0.68419
published_at 2026-04-11T12:55:00Z
7
value 0.00563
scoring_system epss
scoring_elements 0.68406
published_at 2026-04-12T12:55:00Z
8
value 0.00563
scoring_system epss
scoring_elements 0.68373
published_at 2026-04-13T12:55:00Z
9
value 0.00563
scoring_system epss
scoring_elements 0.68411
published_at 2026-04-16T12:55:00Z
10
value 0.00563
scoring_system epss
scoring_elements 0.68425
published_at 2026-04-18T12:55:00Z
11
value 0.00563
scoring_system epss
scoring_elements 0.68403
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535575
reference_id 1535575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535575
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685
reference_id 889685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5710
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zx87-dep4-8bg2
77
url VCID-zxvf-pz4q-myey
vulnerability_id VCID-zxvf-pz4q-myey
summary krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8630
reference_id
reference_type
scores
0
value 0.03005
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-18T12:55:00Z
1
value 0.03005
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-13T12:55:00Z
2
value 0.03005
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-16T12:55:00Z
3
value 0.03005
scoring_system epss
scoring_elements 0.86516
published_at 2026-04-01T12:55:00Z
4
value 0.03005
scoring_system epss
scoring_elements 0.86527
published_at 2026-04-02T12:55:00Z
5
value 0.03005
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-07T12:55:00Z
6
value 0.03005
scoring_system epss
scoring_elements 0.86564
published_at 2026-04-08T12:55:00Z
7
value 0.03005
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-09T12:55:00Z
8
value 0.03005
scoring_system epss
scoring_elements 0.86588
published_at 2026-04-21T12:55:00Z
9
value 0.03005
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8630
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
9
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
10
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
11
reference_url http://www.securitytracker.com/id/1034915
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034915
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302632
reference_id 1302632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302632
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127
reference_id 813127
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8630
reference_id CVE-2015-8630
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8630
29
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8630
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvf-pz4q-myey
Fixing_vulnerabilities
0
url VCID-13ef-rcfm-gqcn
vulnerability_id VCID-13ef-rcfm-gqcn
summary krb5: ftpd - use of uninitialized variables
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5894.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5894.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5894
reference_id
reference_type
scores
0
value 0.02774
scoring_system epss
scoring_elements 0.85985
published_at 2026-04-01T12:55:00Z
1
value 0.02774
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-02T12:55:00Z
2
value 0.02774
scoring_system epss
scoring_elements 0.86013
published_at 2026-04-04T12:55:00Z
3
value 0.02774
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-07T12:55:00Z
4
value 0.02774
scoring_system epss
scoring_elements 0.86032
published_at 2026-04-08T12:55:00Z
5
value 0.02774
scoring_system epss
scoring_elements 0.86041
published_at 2026-04-09T12:55:00Z
6
value 0.02774
scoring_system epss
scoring_elements 0.86055
published_at 2026-04-11T12:55:00Z
7
value 0.02774
scoring_system epss
scoring_elements 0.86053
published_at 2026-04-12T12:55:00Z
8
value 0.02774
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-13T12:55:00Z
9
value 0.02774
scoring_system epss
scoring_elements 0.86066
published_at 2026-04-16T12:55:00Z
10
value 0.02774
scoring_system epss
scoring_elements 0.86071
published_at 2026-04-18T12:55:00Z
11
value 0.02774
scoring_system epss
scoring_elements 0.86063
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5894
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=415311
reference_id 415311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=415311
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
reference_id 454974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-5894
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13ef-rcfm-gqcn
1
url VCID-2m9u-qbs9-gqeq
vulnerability_id VCID-2m9u-qbs9-gqeq
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    remote code execution with root privileges by unauthenticated users.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
3
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548
4
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
5
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
6
reference_url http://osvdb.org/36595
reference_id
reference_type
scores
url http://osvdb.org/36595
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2798.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2798.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2798
reference_id
reference_type
scores
0
value 0.34892
scoring_system epss
scoring_elements 0.97038
published_at 2026-04-21T12:55:00Z
1
value 0.34892
scoring_system epss
scoring_elements 0.96992
published_at 2026-04-01T12:55:00Z
2
value 0.34892
scoring_system epss
scoring_elements 0.97
published_at 2026-04-02T12:55:00Z
3
value 0.34892
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-04T12:55:00Z
4
value 0.34892
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-07T12:55:00Z
5
value 0.34892
scoring_system epss
scoring_elements 0.97015
published_at 2026-04-08T12:55:00Z
6
value 0.34892
scoring_system epss
scoring_elements 0.97016
published_at 2026-04-09T12:55:00Z
7
value 0.34892
scoring_system epss
scoring_elements 0.97019
published_at 2026-04-11T12:55:00Z
8
value 0.34892
scoring_system epss
scoring_elements 0.9702
published_at 2026-04-12T12:55:00Z
9
value 0.34892
scoring_system epss
scoring_elements 0.97021
published_at 2026-04-13T12:55:00Z
10
value 0.34892
scoring_system epss
scoring_elements 0.9703
published_at 2026-04-16T12:55:00Z
11
value 0.34892
scoring_system epss
scoring_elements 0.97034
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798
10
reference_url http://secunia.com/advisories/25800
reference_id
reference_type
scores
url http://secunia.com/advisories/25800
11
reference_url http://secunia.com/advisories/25801
reference_id
reference_type
scores
url http://secunia.com/advisories/25801
12
reference_url http://secunia.com/advisories/25814
reference_id
reference_type
scores
url http://secunia.com/advisories/25814
13
reference_url http://secunia.com/advisories/25821
reference_id
reference_type
scores
url http://secunia.com/advisories/25821
14
reference_url http://secunia.com/advisories/25870
reference_id
reference_type
scores
url http://secunia.com/advisories/25870
15
reference_url http://secunia.com/advisories/25875
reference_id
reference_type
scores
url http://secunia.com/advisories/25875
16
reference_url http://secunia.com/advisories/25888
reference_id
reference_type
scores
url http://secunia.com/advisories/25888
17
reference_url http://secunia.com/advisories/25890
reference_id
reference_type
scores
url http://secunia.com/advisories/25890
18
reference_url http://secunia.com/advisories/25894
reference_id
reference_type
scores
url http://secunia.com/advisories/25894
19
reference_url http://secunia.com/advisories/25911
reference_id
reference_type
scores
url http://secunia.com/advisories/25911
20
reference_url http://secunia.com/advisories/26033
reference_id
reference_type
scores
url http://secunia.com/advisories/26033
21
reference_url http://secunia.com/advisories/26228
reference_id
reference_type
scores
url http://secunia.com/advisories/26228
22
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
23
reference_url http://secunia.com/advisories/26909
reference_id
reference_type
scores
url http://secunia.com/advisories/26909
24
reference_url http://secunia.com/advisories/27706
reference_id
reference_type
scores
url http://secunia.com/advisories/27706
25
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
26
reference_url http://security.gentoo.org/glsa/glsa-200707-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-11.xml
27
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35080
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35080
28
reference_url https://issues.rpath.com/browse/RPL-1499
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1499
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726
30
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996
32
reference_url https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.html
reference_id
reference_type
scores
url https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.html
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1
34
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt
35
reference_url http://www.debian.org/security/2007/dsa-1323
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1323
36
reference_url http://www.kb.cert.org/vuls/id/554257
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/554257
37
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
38
reference_url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2007-0384.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0384.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2007-0562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0562.html
41
reference_url http://www.securityfocus.com/archive/1/472289/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472289/100/0/threaded
42
reference_url http://www.securityfocus.com/archive/1/472432/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472432/100/0/threaded
43
reference_url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
44
reference_url http://www.securityfocus.com/bid/24653
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24653
45
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
46
reference_url http://www.securitytracker.com/id?1018295
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018295
47
reference_url http://www.trustix.org/errata/2007/0021/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0021/
48
reference_url http://www.ubuntu.com/usn/usn-477-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-477-1
49
reference_url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
50
reference_url http://www.vupen.com/english/advisories/2007/2337
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2337
51
reference_url http://www.vupen.com/english/advisories/2007/2370
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2370
52
reference_url http://www.vupen.com/english/advisories/2007/2491
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2491
53
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
54
reference_url http://www.vupen.com/english/advisories/2007/3229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3229
55
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245549
reference_id 245549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245549
57
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430785
reference_id 430785
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430785
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2798
reference_id CVE-2007-2798
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2798
65
reference_url https://security.gentoo.org/glsa/200707-11
reference_id GLSA-200707-11
reference_type
scores
url https://security.gentoo.org/glsa/200707-11
66
reference_url https://access.redhat.com/errata/RHSA-2007:0384
reference_id RHSA-2007:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0384
67
reference_url https://access.redhat.com/errata/RHSA-2007:0562
reference_id RHSA-2007:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0562
68
reference_url https://usn.ubuntu.com/477-1/
reference_id USN-477-1
reference_type
scores
url https://usn.ubuntu.com/477-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-2798
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m9u-qbs9-gqeq
2
url VCID-456e-sucy-fug9
vulnerability_id VCID-456e-sucy-fug9
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0947
reference_id
reference_type
scores
0
value 0.45097
scoring_system epss
scoring_elements 0.97571
published_at 2026-04-01T12:55:00Z
1
value 0.45097
scoring_system epss
scoring_elements 0.97577
published_at 2026-04-02T12:55:00Z
2
value 0.45097
scoring_system epss
scoring_elements 0.9758
published_at 2026-04-04T12:55:00Z
3
value 0.45097
scoring_system epss
scoring_elements 0.97581
published_at 2026-04-07T12:55:00Z
4
value 0.45097
scoring_system epss
scoring_elements 0.97587
published_at 2026-04-08T12:55:00Z
5
value 0.45097
scoring_system epss
scoring_elements 0.97589
published_at 2026-04-09T12:55:00Z
6
value 0.45097
scoring_system epss
scoring_elements 0.97592
published_at 2026-04-11T12:55:00Z
7
value 0.45097
scoring_system epss
scoring_elements 0.97594
published_at 2026-04-12T12:55:00Z
8
value 0.45097
scoring_system epss
scoring_elements 0.97595
published_at 2026-04-13T12:55:00Z
9
value 0.45097
scoring_system epss
scoring_elements 0.97603
published_at 2026-04-16T12:55:00Z
10
value 0.45097
scoring_system epss
scoring_elements 0.97604
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=433596
reference_id 433596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=433596
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2008-0947
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-456e-sucy-fug9
3
url VCID-4xhj-p3vp-wqgk
vulnerability_id VCID-4xhj-p3vp-wqgk
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    remote code execution with root privileges by unauthenticated users.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
3
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
5
reference_url http://osvdb.org/36597
reference_id
reference_type
scores
url http://osvdb.org/36597
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2443.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2443.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2443
reference_id
reference_type
scores
0
value 0.32345
scoring_system epss
scoring_elements 0.96853
published_at 2026-04-21T12:55:00Z
1
value 0.32345
scoring_system epss
scoring_elements 0.96815
published_at 2026-04-01T12:55:00Z
2
value 0.32345
scoring_system epss
scoring_elements 0.96822
published_at 2026-04-02T12:55:00Z
3
value 0.32345
scoring_system epss
scoring_elements 0.96823
published_at 2026-04-04T12:55:00Z
4
value 0.32345
scoring_system epss
scoring_elements 0.96827
published_at 2026-04-07T12:55:00Z
5
value 0.32345
scoring_system epss
scoring_elements 0.96835
published_at 2026-04-08T12:55:00Z
6
value 0.32345
scoring_system epss
scoring_elements 0.96836
published_at 2026-04-09T12:55:00Z
7
value 0.32345
scoring_system epss
scoring_elements 0.96839
published_at 2026-04-12T12:55:00Z
8
value 0.32345
scoring_system epss
scoring_elements 0.9684
published_at 2026-04-13T12:55:00Z
9
value 0.32345
scoring_system epss
scoring_elements 0.96847
published_at 2026-04-16T12:55:00Z
10
value 0.32345
scoring_system epss
scoring_elements 0.96851
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2443
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
9
reference_url http://secunia.com/advisories/25800
reference_id
reference_type
scores
url http://secunia.com/advisories/25800
10
reference_url http://secunia.com/advisories/25801
reference_id
reference_type
scores
url http://secunia.com/advisories/25801
11
reference_url http://secunia.com/advisories/25814
reference_id
reference_type
scores
url http://secunia.com/advisories/25814
12
reference_url http://secunia.com/advisories/25821
reference_id
reference_type
scores
url http://secunia.com/advisories/25821
13
reference_url http://secunia.com/advisories/25870
reference_id
reference_type
scores
url http://secunia.com/advisories/25870
14
reference_url http://secunia.com/advisories/25888
reference_id
reference_type
scores
url http://secunia.com/advisories/25888
15
reference_url http://secunia.com/advisories/25890
reference_id
reference_type
scores
url http://secunia.com/advisories/25890
16
reference_url http://secunia.com/advisories/25894
reference_id
reference_type
scores
url http://secunia.com/advisories/25894
17
reference_url http://secunia.com/advisories/25911
reference_id
reference_type
scores
url http://secunia.com/advisories/25911
18
reference_url http://secunia.com/advisories/26033
reference_id
reference_type
scores
url http://secunia.com/advisories/26033
19
reference_url http://secunia.com/advisories/26228
reference_id
reference_type
scores
url http://secunia.com/advisories/26228
20
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
21
reference_url http://secunia.com/advisories/26909
reference_id
reference_type
scores
url http://secunia.com/advisories/26909
22
reference_url http://secunia.com/advisories/27706
reference_id
reference_type
scores
url http://secunia.com/advisories/27706
23
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
24
reference_url http://security.gentoo.org/glsa/glsa-200707-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-11.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35085
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35085
26
reference_url https://issues.rpath.com/browse/RPL-1499
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1499
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11277
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11277
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7131
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7131
29
reference_url https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html
reference_id
reference_type
scores
url https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
31
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
32
reference_url http://www.debian.org/security/2007/dsa-1323
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1323
33
reference_url http://www.kb.cert.org/vuls/id/365313
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/365313
34
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
35
reference_url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2007-0384.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0384.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2007-0562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0562.html
38
reference_url http://www.securityfocus.com/archive/1/472288/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472288/100/0/threaded
39
reference_url http://www.securityfocus.com/archive/1/472432/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472432/100/0/threaded
40
reference_url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
41
reference_url http://www.securityfocus.com/bid/24657
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24657
42
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
43
reference_url http://www.securitytracker.com/id?1018293
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018293
44
reference_url http://www.trustix.org/errata/2007/0021/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0021/
45
reference_url http://www.ubuntu.com/usn/usn-477-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-477-1
46
reference_url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
47
reference_url http://www.vupen.com/english/advisories/2007/2337
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2337
48
reference_url http://www.vupen.com/english/advisories/2007/2491
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2491
49
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
50
reference_url http://www.vupen.com/english/advisories/2007/3229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3229
51
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245548
reference_id 245548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245548
53
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787
reference_id 430787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2443
reference_id CVE-2007-2443
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2443
61
reference_url https://security.gentoo.org/glsa/200707-11
reference_id GLSA-200707-11
reference_type
scores
url https://security.gentoo.org/glsa/200707-11
62
reference_url https://access.redhat.com/errata/RHSA-2007:0384
reference_id RHSA-2007:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0384
63
reference_url https://access.redhat.com/errata/RHSA-2007:0562
reference_id RHSA-2007:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0562
64
reference_url https://usn.ubuntu.com/477-1/
reference_id USN-477-1
reference_type
scores
url https://usn.ubuntu.com/477-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-2443
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xhj-p3vp-wqgk
4
url VCID-62tb-gfsj-nfbp
vulnerability_id VCID-62tb-gfsj-nfbp
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=305391
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305391
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
3
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0957
reference_id
reference_type
scores
0
value 0.26118
scoring_system epss
scoring_elements 0.96304
published_at 2026-04-21T12:55:00Z
1
value 0.26118
scoring_system epss
scoring_elements 0.9625
published_at 2026-04-01T12:55:00Z
2
value 0.26118
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-02T12:55:00Z
3
value 0.26118
scoring_system epss
scoring_elements 0.96265
published_at 2026-04-04T12:55:00Z
4
value 0.26118
scoring_system epss
scoring_elements 0.96269
published_at 2026-04-07T12:55:00Z
5
value 0.26118
scoring_system epss
scoring_elements 0.96278
published_at 2026-04-08T12:55:00Z
6
value 0.26118
scoring_system epss
scoring_elements 0.96281
published_at 2026-04-09T12:55:00Z
7
value 0.26118
scoring_system epss
scoring_elements 0.96286
published_at 2026-04-12T12:55:00Z
8
value 0.26118
scoring_system epss
scoring_elements 0.9629
published_at 2026-04-13T12:55:00Z
9
value 0.26118
scoring_system epss
scoring_elements 0.96298
published_at 2026-04-16T12:55:00Z
10
value 0.26118
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0957
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957
7
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
8
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
9
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
10
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
11
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
12
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
13
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
14
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
15
reference_url http://secunia.com/advisories/24798
reference_id
reference_type
scores
url http://secunia.com/advisories/24798
16
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
17
reference_url http://secunia.com/advisories/24966
reference_id
reference_type
scores
url http://secunia.com/advisories/24966
18
reference_url http://secunia.com/advisories/25464
reference_id
reference_type
scores
url http://secunia.com/advisories/25464
19
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
22
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
23
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
24
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
25
reference_url http://www.kb.cert.org/vuls/id/704024
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/704024
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
27
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
28
reference_url http://www.securityfocus.com/archive/1/464592/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464592/100/0/threaded
29
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
31
reference_url http://www.securityfocus.com/bid/23285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23285
32
reference_url http://www.securitytracker.com/id?1017849
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017849
33
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
34
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
35
reference_url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
36
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
37
reference_url http://www.vupen.com/english/advisories/2007/1250
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1250
38
reference_url http://www.vupen.com/english/advisories/2007/1470
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1470
39
reference_url http://www.vupen.com/english/advisories/2007/1983
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1983
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231528
reference_id 231528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231528
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0957
reference_id CVE-2007-0957
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0957
48
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
49
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
50
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-0957
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62tb-gfsj-nfbp
5
url VCID-666r-bxyt-bkcx
vulnerability_id VCID-666r-bxyt-bkcx
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=305391
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305391
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
3
reference_url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
4
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1216
reference_id
reference_type
scores
0
value 0.25853
scoring_system epss
scoring_elements 0.96279
published_at 2026-04-21T12:55:00Z
1
value 0.25853
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-01T12:55:00Z
2
value 0.25853
scoring_system epss
scoring_elements 0.96233
published_at 2026-04-02T12:55:00Z
3
value 0.25853
scoring_system epss
scoring_elements 0.96241
published_at 2026-04-04T12:55:00Z
4
value 0.25853
scoring_system epss
scoring_elements 0.96245
published_at 2026-04-07T12:55:00Z
5
value 0.25853
scoring_system epss
scoring_elements 0.96254
published_at 2026-04-08T12:55:00Z
6
value 0.25853
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-09T12:55:00Z
7
value 0.25853
scoring_system epss
scoring_elements 0.96261
published_at 2026-04-12T12:55:00Z
8
value 0.25853
scoring_system epss
scoring_elements 0.96264
published_at 2026-04-13T12:55:00Z
9
value 0.25853
scoring_system epss
scoring_elements 0.96273
published_at 2026-04-16T12:55:00Z
10
value 0.25853
scoring_system epss
scoring_elements 0.96277
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1216
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216
8
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
9
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
10
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
11
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
12
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
13
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
14
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
15
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
16
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
17
reference_url http://secunia.com/advisories/24966
reference_id
reference_type
scores
url http://secunia.com/advisories/24966
18
reference_url http://secunia.com/advisories/25388
reference_id
reference_type
scores
url http://secunia.com/advisories/25388
19
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
22
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt
23
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
24
reference_url http://www.kb.cert.org/vuls/id/419344
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/419344
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
26
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
27
reference_url http://www.securityfocus.com/archive/1/464591/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464591/100/0/threaded
28
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
29
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
30
reference_url http://www.securityfocus.com/bid/23282
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23282
31
reference_url http://www.securitytracker.com/id?1017852
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017852
32
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
33
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
34
reference_url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
35
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
36
reference_url http://www.vupen.com/english/advisories/2007/1470
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1470
37
reference_url http://www.vupen.com/english/advisories/2007/1916
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1916
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231537
reference_id 231537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231537
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1216
reference_id CVE-2007-1216
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1216
46
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
47
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
48
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-1216
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-666r-bxyt-bkcx
6
url VCID-8bak-mpwa-s3ft
vulnerability_id VCID-8bak-mpwa-s3ft
summary
Two vulnerabilities have been found in MIT Kerberos 5, which could allow a
    remote unauthenticated user to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3999.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3999
reference_id
reference_type
scores
0
value 0.46976
scoring_system epss
scoring_elements 0.97652
published_at 2026-04-01T12:55:00Z
1
value 0.46976
scoring_system epss
scoring_elements 0.97658
published_at 2026-04-02T12:55:00Z
2
value 0.46976
scoring_system epss
scoring_elements 0.9766
published_at 2026-04-04T12:55:00Z
3
value 0.46976
scoring_system epss
scoring_elements 0.97661
published_at 2026-04-07T12:55:00Z
4
value 0.46976
scoring_system epss
scoring_elements 0.97665
published_at 2026-04-08T12:55:00Z
5
value 0.46976
scoring_system epss
scoring_elements 0.97668
published_at 2026-04-09T12:55:00Z
6
value 0.46976
scoring_system epss
scoring_elements 0.9767
published_at 2026-04-11T12:55:00Z
7
value 0.46976
scoring_system epss
scoring_elements 0.97673
published_at 2026-04-12T12:55:00Z
8
value 0.46976
scoring_system epss
scoring_elements 0.97674
published_at 2026-04-13T12:55:00Z
9
value 0.46976
scoring_system epss
scoring_elements 0.97681
published_at 2026-04-16T12:55:00Z
10
value 0.46976
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-18T12:55:00Z
11
value 0.46976
scoring_system epss
scoring_elements 0.97682
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250973
reference_id 250973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250973
4
reference_url https://security.gentoo.org/glsa/200709-01
reference_id GLSA-200709-01
reference_type
scores
url https://security.gentoo.org/glsa/200709-01
5
reference_url https://security.gentoo.org/glsa/200710-01
reference_id GLSA-200710-01
reference_type
scores
url https://security.gentoo.org/glsa/200710-01
6
reference_url https://access.redhat.com/errata/RHSA-2007:0858
reference_id RHSA-2007:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0858
7
reference_url https://access.redhat.com/errata/RHSA-2007:0913
reference_id RHSA-2007:0913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0913
8
reference_url https://access.redhat.com/errata/RHSA-2007:0951
reference_id RHSA-2007:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0951
9
reference_url https://usn.ubuntu.com/511-1/
reference_id USN-511-1
reference_type
scores
url https://usn.ubuntu.com/511-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-3999
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bak-mpwa-s3ft
7
url VCID-hg4a-pcem-pqf9
vulnerability_id VCID-hg4a-pcem-pqf9
summary krb5: double free in kdb lib
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5972.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5972
reference_id
reference_type
scores
0
value 0.01923
scoring_system epss
scoring_elements 0.83291
published_at 2026-04-01T12:55:00Z
1
value 0.01923
scoring_system epss
scoring_elements 0.83307
published_at 2026-04-02T12:55:00Z
2
value 0.01923
scoring_system epss
scoring_elements 0.83323
published_at 2026-04-07T12:55:00Z
3
value 0.01923
scoring_system epss
scoring_elements 0.83347
published_at 2026-04-08T12:55:00Z
4
value 0.01923
scoring_system epss
scoring_elements 0.83356
published_at 2026-04-09T12:55:00Z
5
value 0.01923
scoring_system epss
scoring_elements 0.83372
published_at 2026-04-11T12:55:00Z
6
value 0.01923
scoring_system epss
scoring_elements 0.83366
published_at 2026-04-12T12:55:00Z
7
value 0.01923
scoring_system epss
scoring_elements 0.83361
published_at 2026-04-13T12:55:00Z
8
value 0.01923
scoring_system epss
scoring_elements 0.83397
published_at 2026-04-16T12:55:00Z
9
value 0.01923
scoring_system epss
scoring_elements 0.83398
published_at 2026-04-18T12:55:00Z
10
value 0.01923
scoring_system epss
scoring_elements 0.83399
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=415361
reference_id 415361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=415361
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
reference_id 454974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
5
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
6
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-5972
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4a-pcem-pqf9
8
url VCID-mqz8-mxsg-xqam
vulnerability_id VCID-mqz8-mxsg-xqam
summary krb5: integer overflow in rpc lib
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5902.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5902.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5902
reference_id
reference_type
scores
0
value 0.04002
scoring_system epss
scoring_elements 0.88382
published_at 2026-04-01T12:55:00Z
1
value 0.04002
scoring_system epss
scoring_elements 0.8839
published_at 2026-04-02T12:55:00Z
2
value 0.04002
scoring_system epss
scoring_elements 0.88399
published_at 2026-04-04T12:55:00Z
3
value 0.04002
scoring_system epss
scoring_elements 0.88404
published_at 2026-04-07T12:55:00Z
4
value 0.04002
scoring_system epss
scoring_elements 0.88423
published_at 2026-04-08T12:55:00Z
5
value 0.04002
scoring_system epss
scoring_elements 0.88429
published_at 2026-04-09T12:55:00Z
6
value 0.04002
scoring_system epss
scoring_elements 0.8844
published_at 2026-04-11T12:55:00Z
7
value 0.04002
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-13T12:55:00Z
8
value 0.04002
scoring_system epss
scoring_elements 0.88446
published_at 2026-04-16T12:55:00Z
9
value 0.04002
scoring_system epss
scoring_elements 0.88443
published_at 2026-04-18T12:55:00Z
10
value 0.04002
scoring_system epss
scoring_elements 0.88441
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5902
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=415341
reference_id 415341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=415341
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
reference_id 454974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
5
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
6
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-5902
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqz8-mxsg-xqam
9
url VCID-mrjw-ybt8-p3bp
vulnerability_id VCID-mrjw-ybt8-p3bp
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    remote code execution with root privileges by unauthenticated users.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
3
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
5
reference_url http://osvdb.org/36596
reference_id
reference_type
scores
url http://osvdb.org/36596
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2442.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2442
reference_id
reference_type
scores
0
value 0.42571
scoring_system epss
scoring_elements 0.97479
published_at 2026-04-21T12:55:00Z
1
value 0.42571
scoring_system epss
scoring_elements 0.97442
published_at 2026-04-01T12:55:00Z
2
value 0.42571
scoring_system epss
scoring_elements 0.97449
published_at 2026-04-02T12:55:00Z
3
value 0.42571
scoring_system epss
scoring_elements 0.97453
published_at 2026-04-04T12:55:00Z
4
value 0.42571
scoring_system epss
scoring_elements 0.97454
published_at 2026-04-07T12:55:00Z
5
value 0.42571
scoring_system epss
scoring_elements 0.9746
published_at 2026-04-08T12:55:00Z
6
value 0.42571
scoring_system epss
scoring_elements 0.97462
published_at 2026-04-09T12:55:00Z
7
value 0.42571
scoring_system epss
scoring_elements 0.97465
published_at 2026-04-11T12:55:00Z
8
value 0.42571
scoring_system epss
scoring_elements 0.97467
published_at 2026-04-12T12:55:00Z
9
value 0.42571
scoring_system epss
scoring_elements 0.97468
published_at 2026-04-13T12:55:00Z
10
value 0.42571
scoring_system epss
scoring_elements 0.97476
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2442
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442
9
reference_url http://secunia.com/advisories/25800
reference_id
reference_type
scores
url http://secunia.com/advisories/25800
10
reference_url http://secunia.com/advisories/25801
reference_id
reference_type
scores
url http://secunia.com/advisories/25801
11
reference_url http://secunia.com/advisories/25814
reference_id
reference_type
scores
url http://secunia.com/advisories/25814
12
reference_url http://secunia.com/advisories/25821
reference_id
reference_type
scores
url http://secunia.com/advisories/25821
13
reference_url http://secunia.com/advisories/25841
reference_id
reference_type
scores
url http://secunia.com/advisories/25841
14
reference_url http://secunia.com/advisories/25870
reference_id
reference_type
scores
url http://secunia.com/advisories/25870
15
reference_url http://secunia.com/advisories/25888
reference_id
reference_type
scores
url http://secunia.com/advisories/25888
16
reference_url http://secunia.com/advisories/25890
reference_id
reference_type
scores
url http://secunia.com/advisories/25890
17
reference_url http://secunia.com/advisories/25894
reference_id
reference_type
scores
url http://secunia.com/advisories/25894
18
reference_url http://secunia.com/advisories/25911
reference_id
reference_type
scores
url http://secunia.com/advisories/25911
19
reference_url http://secunia.com/advisories/26033
reference_id
reference_type
scores
url http://secunia.com/advisories/26033
20
reference_url http://secunia.com/advisories/26228
reference_id
reference_type
scores
url http://secunia.com/advisories/26228
21
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
22
reference_url http://secunia.com/advisories/26909
reference_id
reference_type
scores
url http://secunia.com/advisories/26909
23
reference_url http://secunia.com/advisories/27706
reference_id
reference_type
scores
url http://secunia.com/advisories/27706
24
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
25
reference_url http://security.gentoo.org/glsa/glsa-200707-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-11.xml
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35082
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35082
27
reference_url https://issues.rpath.com/browse/RPL-1499
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1499
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344
30
reference_url https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html
reference_id
reference_type
scores
url https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html
31
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1
32
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
33
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
34
reference_url http://www.debian.org/security/2007/dsa-1323
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1323
35
reference_url http://www.kb.cert.org/vuls/id/356961
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/356961
36
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
37
reference_url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_38_krb5.html
38
reference_url http://www.redhat.com/support/errata/RHSA-2007-0384.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0384.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2007-0562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0562.html
40
reference_url http://www.securityfocus.com/archive/1/472288/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472288/100/0/threaded
41
reference_url http://www.securityfocus.com/archive/1/472432/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472432/100/0/threaded
42
reference_url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472507/30/5970/threaded
43
reference_url http://www.securityfocus.com/bid/24655
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24655
44
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
45
reference_url http://www.securitytracker.com/id?1018293
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018293
46
reference_url http://www.trustix.org/errata/2007/0021/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0021/
47
reference_url http://www.ubuntu.com/usn/usn-477-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-477-1
48
reference_url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-177A.html
49
reference_url http://www.vupen.com/english/advisories/2007/2337
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2337
50
reference_url http://www.vupen.com/english/advisories/2007/2354
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2354
51
reference_url http://www.vupen.com/english/advisories/2007/2491
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2491
52
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
53
reference_url http://www.vupen.com/english/advisories/2007/3229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3229
54
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245547
reference_id 245547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245547
56
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787
reference_id 430787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2442
reference_id CVE-2007-2442
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2442
64
reference_url https://security.gentoo.org/glsa/200707-11
reference_id GLSA-200707-11
reference_type
scores
url https://security.gentoo.org/glsa/200707-11
65
reference_url https://access.redhat.com/errata/RHSA-2007:0384
reference_id RHSA-2007:0384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0384
66
reference_url https://access.redhat.com/errata/RHSA-2007:0562
reference_id RHSA-2007:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0562
67
reference_url https://usn.ubuntu.com/477-1/
reference_id USN-477-1
reference_type
scores
url https://usn.ubuntu.com/477-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-2442
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrjw-ybt8-p3bp
10
url VCID-n195-kd7a-b7ef
vulnerability_id VCID-n195-kd7a-b7ef
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0063
reference_id
reference_type
scores
0
value 0.04904
scoring_system epss
scoring_elements 0.89562
published_at 2026-04-01T12:55:00Z
1
value 0.04904
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-02T12:55:00Z
2
value 0.04904
scoring_system epss
scoring_elements 0.89579
published_at 2026-04-07T12:55:00Z
3
value 0.04904
scoring_system epss
scoring_elements 0.89595
published_at 2026-04-08T12:55:00Z
4
value 0.04904
scoring_system epss
scoring_elements 0.896
published_at 2026-04-13T12:55:00Z
5
value 0.04904
scoring_system epss
scoring_elements 0.89607
published_at 2026-04-12T12:55:00Z
6
value 0.04904
scoring_system epss
scoring_elements 0.89614
published_at 2026-04-16T12:55:00Z
7
value 0.04904
scoring_system epss
scoring_elements 0.89616
published_at 2026-04-18T12:55:00Z
8
value 0.04904
scoring_system epss
scoring_elements 0.89611
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432621
reference_id 432621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432621
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://access.redhat.com/errata/RHSA-2008:0180
reference_id RHSA-2008:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0180
7
reference_url https://access.redhat.com/errata/RHSA-2008:0181
reference_id RHSA-2008:0181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0181
8
reference_url https://access.redhat.com/errata/RHSA-2008:0182
reference_id RHSA-2008:0182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0182
9
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2008-0063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n195-kd7a-b7ef
11
url VCID-pw5t-tpab-vbas
vulnerability_id VCID-pw5t-tpab-vbas
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5971
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23691
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23807
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23847
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23624
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23693
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23739
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23712
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23668
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23659
published_at 2026-04-18T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.2364
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=415351
reference_id 415351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=415351
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
reference_id 454974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
5
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
6
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
7
reference_url https://access.redhat.com/errata/RHSA-2008:0180
reference_id RHSA-2008:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0180
8
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
9
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-5971
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw5t-tpab-vbas
12
url VCID-sazf-9s2b-d3a2
vulnerability_id VCID-sazf-9s2b-d3a2
summary krb5 incomplete fix for CVE-2007-3999
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4743.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4743
reference_id
reference_type
scores
0
value 0.19637
scoring_system epss
scoring_elements 0.95385
published_at 2026-04-01T12:55:00Z
1
value 0.19637
scoring_system epss
scoring_elements 0.95394
published_at 2026-04-02T12:55:00Z
2
value 0.19637
scoring_system epss
scoring_elements 0.954
published_at 2026-04-04T12:55:00Z
3
value 0.19637
scoring_system epss
scoring_elements 0.95403
published_at 2026-04-07T12:55:00Z
4
value 0.19637
scoring_system epss
scoring_elements 0.9541
published_at 2026-04-08T12:55:00Z
5
value 0.19637
scoring_system epss
scoring_elements 0.95413
published_at 2026-04-09T12:55:00Z
6
value 0.19637
scoring_system epss
scoring_elements 0.95418
published_at 2026-04-12T12:55:00Z
7
value 0.19637
scoring_system epss
scoring_elements 0.9542
published_at 2026-04-13T12:55:00Z
8
value 0.19637
scoring_system epss
scoring_elements 0.95428
published_at 2026-04-16T12:55:00Z
9
value 0.19637
scoring_system epss
scoring_elements 0.95432
published_at 2026-04-18T12:55:00Z
10
value 0.19637
scoring_system epss
scoring_elements 0.95436
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=281561
reference_id 281561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=281561
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441209
reference_id 441209
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441209
5
reference_url https://access.redhat.com/errata/RHSA-2007:0892
reference_id RHSA-2007:0892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0892
6
reference_url https://usn.ubuntu.com/511-2/
reference_id USN-511-2
reference_type
scores
url https://usn.ubuntu.com/511-2/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-4743
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sazf-9s2b-d3a2
13
url VCID-snhh-2g48-xqck
vulnerability_id VCID-snhh-2g48-xqck
summary
Two vulnerabilities have been found in MIT Kerberos 5, which could allow a
    remote unauthenticated user to execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4000.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4000
reference_id
reference_type
scores
0
value 0.23834
scoring_system epss
scoring_elements 0.95979
published_at 2026-04-01T12:55:00Z
1
value 0.23834
scoring_system epss
scoring_elements 0.95986
published_at 2026-04-02T12:55:00Z
2
value 0.23834
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-04T12:55:00Z
3
value 0.23834
scoring_system epss
scoring_elements 0.95998
published_at 2026-04-07T12:55:00Z
4
value 0.23834
scoring_system epss
scoring_elements 0.96007
published_at 2026-04-08T12:55:00Z
5
value 0.23834
scoring_system epss
scoring_elements 0.9601
published_at 2026-04-09T12:55:00Z
6
value 0.23834
scoring_system epss
scoring_elements 0.96014
published_at 2026-04-11T12:55:00Z
7
value 0.23834
scoring_system epss
scoring_elements 0.96013
published_at 2026-04-12T12:55:00Z
8
value 0.23834
scoring_system epss
scoring_elements 0.96016
published_at 2026-04-13T12:55:00Z
9
value 0.23834
scoring_system epss
scoring_elements 0.96025
published_at 2026-04-16T12:55:00Z
10
value 0.23834
scoring_system epss
scoring_elements 0.96031
published_at 2026-04-18T12:55:00Z
11
value 0.23834
scoring_system epss
scoring_elements 0.96032
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250976
reference_id 250976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250976
4
reference_url https://security.gentoo.org/glsa/200709-01
reference_id GLSA-200709-01
reference_type
scores
url https://security.gentoo.org/glsa/200709-01
5
reference_url https://access.redhat.com/errata/RHSA-2007:0858
reference_id RHSA-2007:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0858
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-4000
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snhh-2g48-xqck
14
url VCID-t445-ybb2-gkgz
vulnerability_id VCID-t445-ybb2-gkgz
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5901.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5901
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29529
published_at 2026-04-01T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29596
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29645
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29467
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.2953
published_at 2026-04-08T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29568
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.2957
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29525
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29473
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29492
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29464
published_at 2026-04-18T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29419
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5901
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5901
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=415321
reference_id 415321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=415321
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
reference_id 454974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454974
5
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
6
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
7
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-5901
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t445-ybb2-gkgz
15
url VCID-wfcj-74db-tfg6
vulnerability_id VCID-wfcj-74db-tfg6
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0062
reference_id
reference_type
scores
0
value 0.16257
scoring_system epss
scoring_elements 0.9479
published_at 2026-04-01T12:55:00Z
1
value 0.16257
scoring_system epss
scoring_elements 0.948
published_at 2026-04-02T12:55:00Z
2
value 0.16257
scoring_system epss
scoring_elements 0.94803
published_at 2026-04-04T12:55:00Z
3
value 0.16257
scoring_system epss
scoring_elements 0.94805
published_at 2026-04-07T12:55:00Z
4
value 0.16257
scoring_system epss
scoring_elements 0.94814
published_at 2026-04-08T12:55:00Z
5
value 0.16257
scoring_system epss
scoring_elements 0.94818
published_at 2026-04-09T12:55:00Z
6
value 0.16257
scoring_system epss
scoring_elements 0.94822
published_at 2026-04-11T12:55:00Z
7
value 0.16257
scoring_system epss
scoring_elements 0.94826
published_at 2026-04-12T12:55:00Z
8
value 0.16257
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-13T12:55:00Z
9
value 0.16257
scoring_system epss
scoring_elements 0.94833
published_at 2026-04-16T12:55:00Z
10
value 0.16257
scoring_system epss
scoring_elements 0.94836
published_at 2026-04-18T12:55:00Z
11
value 0.16257
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0062
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432620
reference_id 432620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432620
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://access.redhat.com/errata/RHSA-2008:0180
reference_id RHSA-2008:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0180
7
reference_url https://access.redhat.com/errata/RHSA-2008:0181
reference_id RHSA-2008:0181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0181
8
reference_url https://access.redhat.com/errata/RHSA-2008:0182
reference_id RHSA-2008:0182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0182
9
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2008-0062
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfcj-74db-tfg6
16
url VCID-ype9-agj3-dbfr
vulnerability_id VCID-ype9-agj3-dbfr
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0956
reference_id
reference_type
scores
0
value 0.21911
scoring_system epss
scoring_elements 0.95779
published_at 2026-04-21T12:55:00Z
1
value 0.21911
scoring_system epss
scoring_elements 0.95728
published_at 2026-04-01T12:55:00Z
2
value 0.21911
scoring_system epss
scoring_elements 0.95737
published_at 2026-04-02T12:55:00Z
3
value 0.21911
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-04T12:55:00Z
4
value 0.21911
scoring_system epss
scoring_elements 0.95748
published_at 2026-04-07T12:55:00Z
5
value 0.21911
scoring_system epss
scoring_elements 0.95756
published_at 2026-04-08T12:55:00Z
6
value 0.21911
scoring_system epss
scoring_elements 0.9576
published_at 2026-04-09T12:55:00Z
7
value 0.21911
scoring_system epss
scoring_elements 0.95763
published_at 2026-04-12T12:55:00Z
8
value 0.21911
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-13T12:55:00Z
9
value 0.21911
scoring_system epss
scoring_elements 0.95773
published_at 2026-04-16T12:55:00Z
10
value 0.21911
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956
5
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
6
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
7
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
8
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
9
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
10
reference_url http://secunia.com/advisories/24755
reference_id
reference_type
scores
url http://secunia.com/advisories/24755
11
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
12
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
13
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
14
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
15
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
18
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
19
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
20
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
21
reference_url http://www.kb.cert.org/vuls/id/220816
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/220816
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
23
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
24
reference_url http://www.securityfocus.com/archive/1/464590/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464590/100/0/threaded
25
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
26
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
27
reference_url http://www.securityfocus.com/bid/23281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23281
28
reference_url http://www.securitytracker.com/id?1017848
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017848
29
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
30
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
31
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
32
reference_url http://www.vupen.com/english/advisories/2007/1249
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1249
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=229782
reference_id 229782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=229782
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0956
reference_id CVE-2007-0956
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0956
41
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
42
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
43
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
purl pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-3e2p-t5d5-33hd
4
vulnerability VCID-4e9j-8vtc-tbda
5
vulnerability VCID-4xpe-hb37-5qdm
6
vulnerability VCID-51sv-1nva-eqey
7
vulnerability VCID-5np7-5bb3-wbfx
8
vulnerability VCID-5s5f-d1ue-gfda
9
vulnerability VCID-5txn-a4x1-nbbe
10
vulnerability VCID-5z7g-r4bh-2qb1
11
vulnerability VCID-5zx4-257n-ckhq
12
vulnerability VCID-6fgr-qbwj-bqf5
13
vulnerability VCID-6het-dg8q-7fcj
14
vulnerability VCID-7b71-uhtv-ubcc
15
vulnerability VCID-81qw-myh7-pbdj
16
vulnerability VCID-8rxc-tf1r-wqgm
17
vulnerability VCID-8vzp-yn2u-1ugd
18
vulnerability VCID-8x5j-9wf8-wufr
19
vulnerability VCID-8yk4-du7p-eue4
20
vulnerability VCID-97k8-xbsv-87da
21
vulnerability VCID-985p-gnv3-mfd8
22
vulnerability VCID-9d6t-z5dr-yqgy
23
vulnerability VCID-9hyk-mdvc-1baq
24
vulnerability VCID-a9bp-26kx-p7cb
25
vulnerability VCID-ahrt-vcg3-tbc2
26
vulnerability VCID-bdbh-trh7-8fd6
27
vulnerability VCID-bnpa-8svd-jyct
28
vulnerability VCID-bwpn-qxzd-43g8
29
vulnerability VCID-caxe-5ejt-ffgy
30
vulnerability VCID-d1a1-yfu1-kuaz
31
vulnerability VCID-dj1x-1chn-bbhz
32
vulnerability VCID-dq1q-jbpx-8fhb
33
vulnerability VCID-dv1m-kz1r-8udu
34
vulnerability VCID-dzr3-ncxx-jkck
35
vulnerability VCID-e81a-vujj-yfcs
36
vulnerability VCID-erjs-zb26-eubh
37
vulnerability VCID-fd9s-vn5s-gud6
38
vulnerability VCID-fg2w-sjkb-ebgb
39
vulnerability VCID-h9q8-x3n3-6qdn
40
vulnerability VCID-hryp-mt7d-kygt
41
vulnerability VCID-j6tv-fz95-3kb8
42
vulnerability VCID-j9uk-e9sc-y3gp
43
vulnerability VCID-jask-8b2h-p3h8
44
vulnerability VCID-jfb1-3vg4-vbap
45
vulnerability VCID-ka4c-q3hq-6fe3
46
vulnerability VCID-khdw-3p5j-vya6
47
vulnerability VCID-ktam-mx9t-jqa2
48
vulnerability VCID-mjvu-45rb-6kf8
49
vulnerability VCID-mqs4-crva-ayaz
50
vulnerability VCID-n4xu-cnqt-gbgf
51
vulnerability VCID-nguz-sg5j-87db
52
vulnerability VCID-p65d-bnug-c7fr
53
vulnerability VCID-q2tg-s1kk-4bhc
54
vulnerability VCID-qcva-cb6c-wyds
55
vulnerability VCID-qdte-3pqp-17at
56
vulnerability VCID-qq4w-brbc-8fab
57
vulnerability VCID-qzt5-fxf1-huff
58
vulnerability VCID-r1jf-pd4n-53dr
59
vulnerability VCID-r1wa-3gtw-1qey
60
vulnerability VCID-rmt9-dmmb-kkec
61
vulnerability VCID-rpxk-f19y-87dq
62
vulnerability VCID-sgnn-emh7-kqgh
63
vulnerability VCID-sjw9-kv44-8bgv
64
vulnerability VCID-tsuu-f1qk-jygu
65
vulnerability VCID-u9bx-kfz1-nbcq
66
vulnerability VCID-unvx-tsxw-abbw
67
vulnerability VCID-v61z-w8nz-87bv
68
vulnerability VCID-vr9b-gwxs-fqgg
69
vulnerability VCID-w6yc-w573-vbhy
70
vulnerability VCID-wng4-f8sk-kqg9
71
vulnerability VCID-yuur-7md8-skcv
72
vulnerability VCID-yw2r-vw2q-vffp
73
vulnerability VCID-z6ca-snvn-jyh9
74
vulnerability VCID-zm7m-94dv-3bav
75
vulnerability VCID-zw66-w86u-cuge
76
vulnerability VCID-zx87-dep4-8bg2
77
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7
aliases CVE-2007-0956
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ype9-agj3-dbfr
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.4~beta1-5lenny7